19 Feb 2013

0 Cheat Baseball Heroes Combo Hack On facebook 2013

Tools :


Vist :- http://youtu.be/5czmuAbCXp8 - http://youtu.be/Wao9ioNjTL4
Step :

  • Download dan Instal cheat engine
  • Buka applikasi game Baseball Heroes
  • Buka Cheat Engine
  • Klik "Play Ball"
  • Dalam Cheat Engine pilih :


    1. Process Plugin-Container.axe untuk Firefox.
    2. Chrome.axe untuk Google Chrome (NB : Untuk Google Chrome harus dicoba satu-persatu)
    3. Kemudian : Buka Baseball
      Klik Play Buka "CE" Klik Open Folder Samping Proses Lihat Gambar Pada Angka (1)

      Ambil Data "ComboPoint1" Yg sudah Kamu DownLoad Tadi Trus AktifkanLihat gambar pada angka (2)  Dan Buka Bekas Yang Anda Download tadi


                  Good Luck Slamat Mencoba       

5 Feb 2013

0 CARA HACKER N' CRACKER MEMBOBOL PASSWORD DAN SOLUSI MENAGKALNYA

CARA HACKER N' CRACKER MEMBOBOL PASSWORD DAN SOLUSI MENAGKALNYA

Jaman sekarang yang namanya hacker atau cracker semakin kreatif, dengan berbagai cara mereka berusaha menembus email anda, facebook, rekening online, bahkan blog. Anda tidak mau kan, kalau suatu saat profile facebook anda diubah orang? Atau web site anda tiba-tiba dig anti tampilannya oleh hacker / cracker? Salah satu cara hacker menembus account kita adalah dengan cara menebak password. Hacker menggunakan script yang dapat memasukkan puluhan password tiap detik untuk mencoba masuk ke dalam account anda.

Cara hacker menebak password anda antara lain :
1. Brute force attack, yaitu dengan mencoba semua kombinasi, mulai dari aaaa sampai zzzz sampai beberapa karakter.
2. Dictionary attack, yaitu dengan menebak menggunakan kata-kata dalam kamus, dan dikombinasikan dengan angka-angka atau karakter.
3. Personal information attack, dengan cara memasukkan data-data pribadi seperti nomor telepon, tanggal lahir, nama pacar, kode pos dan sebagainya.

Password yang sangat lemah akan sangat mudah dibobol hacker dengan cara ini. Contoh password yang sangat lemah, misalnya :
1. 123456, qwerty, asdf, ini karena mudah sekali orang mengetik koombinasi ini di keyboard.
2. Password, mypassword, dan lain-lain yang menggunakan kata-kata dalam kamus (semua bahasa).
3. Tanggal lahir, nama pacar, dan lainnya yang merupakan data diri orang tersebut.

Password yang lemah, bisa dibobol dalam waktu yang lebih cepat, misalnya :
1. Menggunakan semua huruf kecil.
2. Menggunakan kombinasi kata dan angka, misalnya buku10, makan25.
3. Mengganti huruf dengan karakter, misalnya c1nt@

Bagaimana membuat password yang kuat dan sulit ditembus hacker?
1. Merupakan kombinasi dari huruf besar,, huruf kecil, nomor dan karakter.
2. Panjang lebih dari 10 karakter.
3. Tidak menyertakan kata-kata dalam kamus.
4. Password yang kuat harus mudah diingat oleh pemiliknya. Contoh password yang kuat : 1mAu$100Ribu’
Cara mengingatnya :
1 = kata â € œsaya â € diterjemahkan dalam bahasa inggris (|)
mAu = mau
$ = uang
100Ribu = 100 ribu

Beberapa tips terkait dengan pencurian password adalah sebagaio berikut :
1. Jangan menngunakan password yang sama untuk berbagai macam layanan, misalnya password email anda sama dengan password facebook.
Hal ini akan berakibat :
- Seseorang yang dapat menjebol password facebook anda, bisa juga menjebol password email anda. Sementara di mata hacker menjebol password lebih mudah daripada menjebol email yahoo.
- Admin facebook tahu password anda, dia juga bisa memasukkan password tersebut ke email anda.
2. Jangan mengklik link di email yang menyatakan anda harus memferivikasi password anda. Email ini dikirim oleh hacker.
3. Jangan memasukkan password disitus selain yang memberikan layanan. Misalnya jangan memasukkan password yahoo di stus facebook untuk alas an apapun. (misalnya import address book).
4. Sebelum login ke email atau yang lain, pastikan URL di browser anda benar. Misalnya mail.yahoo.com bukan mail.yahoo-ltd.com atau yahoo-verify.com atau yang lain.
5. Untuk rekening online seperti e-gold, klik BCA, papal, sebaiknya amda tidak mengetik password anda lewat keyboard (karena hacker bisa membaca keyboard anda dengan program keylogger). Gunakan On screen keyboard, Charakter map, atau copy paste dari huruf acak.

0 Emotion AUDI di facebook

[[345533462139449]] > ;bete
[[308300382542918]] > ;calm
[[309626999060642]] > ;dan2
[[263022747090798]] > ;hai
[[200102950080196]] > ;hwa
[[158227984284324]] > ;mad
[[114550798664378]] > ;mo
[[299734090065127]] > ;omg
[[350421394973827]] > ;shy
[[208296672587372]] > ;doa
[[157844747656241]] > ;etc
[[158207970952008]] > ;groa
[[241721525896214]] > ;grr
[[113519815433465]] > ;hepi
[[239939099411255]] > ;joke
[[346508562029170]] > ;kdip
[[185298018232820]] > ;mbok
[[239249926147852]] > ;phew
[[332418196786941]] > ;shok
[[328430820514942]] > ;tear
[[222287944513884]] > ;we
[[164481350318329]] > ;win
[[330544910308348]] > ;zzz
[[267658843290223]] > ;hoeh
[[180154485416003]] > ;:D
[[221390677938174]] > ;swet
[[269394746450013]] > ;TT
[[222023621206273]] > ;uhuk
[[346372985378735]] > ;luph
[[187322684697844]] > ;tida
[[208533842565519]] > ;cuih
[[266659030060927]] > ;down

Maaf Klo Yg Peach Emoticon Belum Nemuin ^^

3 Feb 2013

0 Remote password hacking software - sniperspy

Spy on a pc
Are you looking for the Best Remote password hacking software? Do you need to spy on your remote computer without the need for physical access? But wait! Before you go for any remote spy software you should read our shocking reviews!

1. Sniper Spy (Remote Install Supported)


Editors Rating: 8/10


Remote password hacking softwareSniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!

remote password hacking software


remote password hacking software

SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
remote password spying software

4. Records any Password (Email, Login, Instant Messenger etc.)

5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall

What if i dont have physical acess to victims computer?


remote password hacking software
 No physical access to your remote PC is needed to install the spy software. Once installed you can view the screen LIVE and browse the file system from anywhere anytime. You can also view chats, websites, keystrokes in any language and more, with screenshots.

This software remotely installs to your computer through email. Unlike the other remote spy titles on the market, SniperSpy is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.

The program then records user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.

Why would I need SniperSpy?

Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. If you can't get to your computer and are worried about the Internet safety or habits of those using it, then you NEED SniperSpy.

This high-tech spy software will allow you to see exactly what your teenager is doing in MySpace and elsewhere in real time. It will also allow you to monitor any employee who uses the company computer(s).

                                Sniperspy No 1 PC Spy software

0 Hack Android With Android Exploitation Framework

IMPORTANT NOTE: The below information is for educational and research purposes only and to illustrate how insecure the Android platform is. You would also come to see, how most of the present Android anti-malwares fail to detect threats in the current scenario. Also, infecting other persons computer/mobile devices with a malicious application without his permission is an punishable crime.
Their exist a lot of tools to exploit the security holes in normal PC environment, but there have been really less tools for the Android environment, which at the same time is expandable. By expandable, i’m trying to say, that the users who use the framework, could build there own modules and share with the security community.

Android Framework for Exploitation is an open-source project which we have developed in order to increase mobile security research, check for application based and platform based vulnerabilities, as well as write plugins for the framework and share it with the community. Subho Halder and me (Aditya Gupta) have developed a framework known as Android Framework for Exploitation, which we released in BlackHat Abu Dhabi in December 2012. The aim of this framework is to help the mobile security community to analyze applications, exploit vulnerabilities, build POCs, and share their own modules with other users.

One of the interesting features of this framework is the ability to build malwares, botnets and even inject malwares in existing legitimate applications. This is just to show that how ineffective our current mobile anti malwares are against these type of infected version of legitimate applications, as at the time of writing, none of the anti malwares for Android detected the malware sample.

Some of the features which we’ll be looking into this post is :

1. Creating a malware
2. Creating a botnet
3. Injecting malicious codes in a legitimate application
4. Analyzing vulnerable applications

Before we go further, let us have a look at the file structure of AFE.
Once you download AFE, you will be having a structure similar to the one given below.



The Input will be containing all the input apk(s) for any processing, such as crypting the apk to make it undetectable from anti malwares, or inserting the apk in any other legitimate apk or so on.

Creating a malware

AFE gives the users to create malwares for their devices with prebuilt templates. You could also modify the source code of the malware, and modify the GUI of the application apk as you want.

To create a malware, first of all you have to launch AFE by typing in ./afe.

To get help at any point of time, just type in ? and hit enter.



Note : This tool is made natively for *nix based systems. If you’re running Windows, you could use it by installing Cygwin. Also make sure you’ve all the dependencies such as Python and the android sdk installed.

Once you are inside menu, type in run [the module name] to execute a particular module.
In this case, the module is named malware.

Once you type in run malware

Just type in your local IP address in the Set Reverse IP option. Once you set your reverse IP (same as LHOST), you’ll have the option of Stealer.



There are 3-predefined stealers, and you can add more yourself. The 3 already existing ones include –

• Call Logs
• Contacts
• Messages

Here’s a video of it.
Creating a Botnet
To create a botnet, you have to launch AFE as mentioned earlier. and go on to create a botnet, similar to as we did in the last demo.  Once you’ve created and installed the botnet in any android based smartphone, you could control it by sending SMS from any phone to the infected phone, and getting the response back using SMS itself. Also, this whole process will go on in the background, so the user won’t be able to know if any kind of malicious activity is being performed.

Some of the sms based commands are : 

toast:  To display a particular message on the screen
infect: To spread the botnet to any other device by sending a sms from already infected device
browse : automatically open a URL on the victim’s phone
shell : The most useful command. Could be used to execute any shell based commands. For example, xysec shell cat /proc/version

Note: All the commands should be appended with the keyword ‘xysec’ - this could be changed by modifying the source of the botnet. This is to make sure the SMS which has been send as a command won’t be displayed in the notification of the victim.

Analyzing Application for Leaking Content Providers

One of the most important components of Android applications while working with application data is Content Providers.

To get the content providers of the application, you could either reverse the application manually, or look for the content providers, or you could use tool such as Apktool, and parse information based on the filter of content://

To find content providers with the help of AFE, you need to place the application you want to analyse in the Input folder.



Once we select the application, it will automatically present us with the list of content providers present in the application.



After finding out the permission of the content providers, and if it is set as exported without any permission checking, the application is vulnerable to leaking content providers vulnerability.

To make a POC of this vulnerability, we could use the content provider (vulnerable one) and make another application parsing this content provider. Following is a sample code snippet we made:



We would in further update the Github repo located at https://github.com/xysec/AFE/ to make POCs automatically.
Injecting malicious codes in legitimate application


Using AFE, you could inject malicious codes in legitimate applications. This is to demonstrate how easy it is for malware authors to create infected version of the legitimate applications, and how anti-malwares should improve their detection strategy to distinguish between fake and legitimate applications.

To create the application:


  • Select the malware to be injected,
  • Choose the target apk
  • Type inject



Once we select our target application, it will inject all the services and permissions from our malware (which we have already created) and even sign the newly create application with our key.



The newly created file will be stored in /Output as the name of [originalapp].apk and [originalapp]_signed.apk.


Creating Plugins for AFE

AFE is an extendable framework, which could be integrated with user made plugins.

To create a plugin, you need to go to the modules directory and create a directory with the name of your plugin name.

Let us take an example of a plugin named as DB Stealer. This plugin, grabs all the database files (.db) from the device or emulator, and saves it on the system. The code for this plugin has been written in PHP.



There are 3 necessary files :

Run.sh
dbstealer.php
dbstealer.info

Run.sh is the initializing code, which will load up the entire code (written in any language, in this case php), and will execute it.

The second file, dbstealer.php is the main code of the plugin. It is loaded from run.sh with the code php dbstealer.php.




The third file dbstealer.info will contain the information about the plugin, which will be displayed when the user will type in info dbstealer from the afe prompt.



Hope you guys enjoyed the post. Feel free to mail us at security@xysec.com for any bug issues/suggestions/trainings/ideas!

0 iOS application security assessment: Sqlite data leakage


Most of the iOS applications store sensitive information like usernames, passwords & transaction details, etc.. either permanently or temporarily on the iPhone to provide offline access for the user. In general, to store large and complex data, iOS applications use the Sqlite database as it offers good memory usage and speed access. For example, to provide offline access Gmail iOS application stores all the emails in a Sqlite database file in plain text format.

Unencrypted sensitive information stored in a Sqlite file can be stolen easily upon gaining physical access to the device or the device backup. Also, if an entry is deleted, Sqlite tags the record as deleted but not purge them. So in case if an application temporarily stores and removes the sensitive data from a Sqlite file, deleted data can be recovered easily by reading the Sqlite Write Ahead Log. The below article explains on how to view Sqlite files and how to recover the deleted data from Sqlite files on the iPhone. For this exercise, I have created a demo application called CardInfo. CardInfo is a self signed application, so it can only be installed on a Jailbroken iPhone. The CardInfo demo application accepts any username & password, then collects the credit card details from the user and stores it in a Sqlite database. Database entries are deleted upon logout from the app.

Steps to install the CardInfo application:
 
1. Jailbreak the iPhone.

2. Download CardInfoDemo,ipa file - Download link.

3. On the Windows, download the iPhone configuration utility – Download link.

4. Open the iPhone configuration utility and drag the CardInfoDemo.ipa file on to it.


5. Connect the iPhone to the windows machine using USB cable. Notice that the connected device is listed in the iPhone configuration utility. Select the device and navigate to Applications tab. It lists the already installed applications on the iPhone along with our CardInfo demo app.



6. Click on Install button corresponding to the CardInfo application.

7. It installs the CardInfo application on to the iPhone.



When an application is installed on the iPhone, it creates a directory with an unique identifier under /var/mobile/Applications directory. Everything that is required for an application to execute will be contained in the created home directory. Steps to view CardInfo Sqlite files: 1. On the Jailbroken iPhone, install OpenSSH and Sqlite3 from Cydia.
2. On windows workstation, download Putty. Connect the iPhone and the workstation to the same Wi-Fi network.
 

Note: Wi-Fi is required to connect the iPhone over SSH. If the Wi-Fi connection is not available SSH into the iPhone over USB.

3. Run Putty and SSH into the iPhone by typing the iPhone IP address, root as username and alpine
as password.

4. Navigate to /var/mobile/Applications/ folder and identify the CardInfo application directory using
find . –name CardInfo’ command. On my iPhone CardInfo application is installed on the - /var/
mobile/Application/B02A125C-B97E-4207-911B-C136B1A08687/
directory.



5. Navigate to the /var/mobile/Application/B02A125C-B97E-4207-911B-C136B1A08687/
CardInfo.app
directory and notice CARDDATABASE.sqlite3 database file.




6. Sqlite database files on a Jailbroken iPhone can be viewed directly using Sqlite3 command line
client. View CARDDATABASE.sqlite3 and notice that CARDINFO table is empty.



7. On the iPhone, open CardInfo application and login (works for any username and password).

8. Enter credit card details and click on Save button. In the background, it saves the card details in
the Sqlite database.






9. View CARDDATABASE.sqlite3 and notice that CARDINFO table contains the data (credit card
details).


10. Logout from the application on the iPhone. In the background, it deletes the data from the Sqlite
database.


11. Now view CARDDATABASE.sqlite3 and notice that CARDINFO table is empty.

Steps to recover the deleted data from CardInfo Sqlite file:

Sqlite database engine writes the data into Write Ahead Log before storing it in the actual database file, to recover from system failures. Upon every checkpoint or commit, the data in the WAL is written into the database file. So if an entry is deleted from the Sqlite database and there is no immediate commit query, we can easily recover the deleted data by reading the WAL. In case of iOS, strings command can be used  to print the deleted data from a Sqlite file. In our case, running ‘strings CARDDATABASE.sqlite3’ command prints the deleted card details.


In iOS, if an application uses the Sqlite database for temporary storage, there is always a possibility to recover the deleted temporary data from the database file.
For better security, use custom encryption while storing the sensitive data in Sqlite database. Also, before deleting a Sqlite record, overwrite that entry with junk data. So even if someone tries to recover the deleted data from Sqlite, they will not get the actual data.

0 Android Reverse Engineering : See Source Code of Android Apps

source: cyberguerre.blogspot.com
I am going to discuss how we can see the source code of the android apps and may be modify/hack according to our own convenience. Various attackers use this technique to inject their own malicious code in the app and the again compiling it and spreading the app.

Tools Required
  1. Dex2jar : It is a tool which is used when working with android .dex and java .jar files.
  2. Jd-gui : This tool opens up the entire coding of .apk file.
Comment with your Email on this post or subscribe to HackingTweaks.com if you want the above tools.

In this article I will be taking example of faceniff.apk as the app to see source code of, but you can take any app of your choice.
Steps involved in reverse engineering android app :
  1. Change the extension of android app to "faceniff.apk.zip".
   2. Unzip the file using any unzipping sofware.
   3. Now open the command prompt and type "cd \".
   4. Then type "cd c:\android\dex2jar-0.0.9.7".( here "C:\android\dex2jar-0.0.9.7" is the path of          dex2jar tool in my drive, this may be different for you). Press enter.
    5. Now type "dex2jar c:\android\Faceniff\classes.dex". Here "c:\android\Faceniff\classes.dex" is the path of the classes.dex file which your will surely be in the the extracted folder of the android app.
    6. You will notice a new executable jar file in the unzipped folder of app. Now open that app with "jd.gui" and you will be able to see the source code of android app.

    This article was originally posted by me at www.hackingarticles.in.

Write for Us: Get a chance to be a part of team of Authors of Hacking Tweaks and get recognition. Contact Here if you are interested.
Services: Get SEO and Cyber Security services from Hacking Tweaks. Check Out the Services section.

0 Android Reverse Engineering : See Source Code of Android Apps

Image source:biztechday.com
Twitter has confirmed in San Francisco on Friday that data of around 250,000 user world wide has been compromised. One live attack was also discovered which was shut down as soon as it was detected. The attackers are not yet identified, anonymous group and Chinese hackers being suspected. Bob Lord, twitter's Information Security Director said "not the work of amateurs". The attack seems to be very sophisticated. Twitter has changes the passwords of hacked accounts and revoked session tokens for those accounts. Changing you password is highly recommended as twitter is also not sure of the number of accounts hacked.

Write for Us: Get a chance to be a part of team of Authors of Hacking Tweaks and get recognition. Contact Here if you are interested.

Services: SEO and Cyber Security services from Hacking Tweaks. Check Out the Services section.
 

Devil Dawn [ Irzzat Badut ] Copyright © 2011 - |- Template created by O Pregador - |- Powered by Blogger Templates