How to implement an ARP poisoning attack

The concept behind this is simple. ARP is the protocol that maintains network devices tables up-to-date by associating an IP address with a MAC address. The problem with ARP is that it doesn’t really care about who answered, it will gladly update the tables from whoever says so. Most of the time, it won’t even ask. So the idea behind the attack, is to send the client an ARP answer saying “hey, I’m the gateway, send stuff to me” and a second ARP answer to the real gateway saying “hey there, I’m this guy, send me his stuff”. 

Then you just have to relay the packets between the victim and the gateway.Those schemas are more simply to understand

In Linux, the rerouting can be done using the following iptables commands:
iptables -t nat -A PREROUTING -i  -p tcp –dport  -j REDIRECT –to-port 
iptables -t nat -D PREROUTING -i  -p tcp –dport  -j REDIRECT –to-port 






Free Demonoid Invitation Codes

I was requested from many of my blog readers to prodive them with Demonoid invitation codes so in this article i will give you some of Free Demonoid Invitation Codes


What is Demonoid?
Demonoid is a BitTorrent tracker web site. It was created in anonymity by a Croatian developer known on the Internet as Deimos. It is considered a semi-public torrent tracking service as only users invited to the service by other users can sign up and use the site. Once registered, you can browse, search and download torrents to use in a program that supports them. Currently, Demonoid hosts more than 250,000 torrents in a variety of categories. There is something for everyone at Demonoid and taking advantage of the site is a great way to find some amazing torrents.



How to hack a remote Computer with telnet

This article is posted on request of Mr Sehaj Mathur who is one of my blog readers,Telnet is a service gives the users to access a host and perform as if they were working, If you call yourself a Hacker you must be able to do telnet.It can be done in many ways, be careful not to try from your home because a tons of hackers have been busted for doing this,I recommend you reading my article on 15 tips on How to Survive as a Hacker to protect yourself from being caught while HackingWell there are many methods to hack with telnet but i will tell you about two simplest method to hack with telnet:

Free Hacking Tools essential For every Hacker

                                    



A Hacking tool is a program which helps you in Hacking making it easier for you,Gone are those days when you have to do every thing manually,now a days Hacking tools have made work easier for you,Below i am posting some of Hacking tools essential for every Hacker out there to make the work alot easier,these tools are also actually a Kind of Security tools but it on you how you use them.


Free Essential Hacking tools For every Hacker:


IP Tools:
IP-Tools offers many TCP/IP utilities in one program. This award-winning Free Hacking tool can work under Windows 98/ME, Windows NT 4.0, Windows 2000/XP/2003, Windows Vista and is indispensable for anyone who uses the Internet or Intranet.
It includes the following utilities 
1.Local Info – examines the local host and shows info about processor, memory, Winsock data, etc. 
2.Name Scanner – scans all hostnames within a range of IP addresses
3.Port Scanner – scans network(s) for active TCP based services 
4.Ping Scanner – pings a remote hosts over the network 
5.Telnet – telnet client 
6.HTTP – HTTP client 
7.IP-Monitor – shows network traffic in real time & many more 
8.IP TOOLS has almost all the utilities built into it.So there is no need to use seperate tools for every indivisual process of hacking such as Port scanning,Whois scanning,IP monitor etc.It’s like a hacking tool kit which has all the necessary tools for hacking.
Download IP Tools Here


Cain and Able:
Hack computer
Cain and Abel (sometimes called simply "Cain") is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.I have made a tutorial on Hack a Computer with Cain and able OR Download Cain and Able Here


Brutus ( Password Cracker):
Brutus is a remote online password cracker for windows, good for HTTP,POP3,FTP,SMB,Telnet and lots others.. it's also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page. Development continues so new releases will be available in the near future. Brutus was written originally to help me check routers etc. for default and common passwords,I have also made a post on Brute force
Password Cracking explained alternatively you can Download Brutus Password Cracker Here


RainbowCrack:
A very nice Hacking tools.Its general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. It cracks hashes with rainbow tables,


Features:
Full time-memory tradeoff tool suites, including rainbow table generation, sort, conversion and lookup
Support rainbow table of any hash algorithm
Support rainbow table of any charset
Support rainbow table in raw file format (.rt) and compact file format (.rtc)
Computation on multi-core processor support
Computation on GPU (via NVIDIA CUDA technology) support
Computation on multi-GPU (via NVIDIA CUDA technology) support
Runs on Windows XP 32-bit, Windows Vista 32-bit and Windows 7 32-bit
Command line and graphics user interface
Download Rainbow Cracker Here


LC5(LophtCrack):
Windows password auditing and recovery application L0phtCrack or LC5 attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, then re-acquired by the original L0pht guys and reborn as LC6 in 2009.


Download LC5 here


John the Ripper:
A powerful, flexible, and fast multi-platform password hash cracker John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find Here and download  john ripper here.


Hope you liked the collection of Hacking tools i will be adding more sooner
 
Rafay Baloch is an Independent security researcher, Internet marketer, Entrepreneur and a SEO consultant, He is the founder of RHA blog and multiple other blogs. Rafay got famous after finding a Remote Code Execution bug inside PayPal for which PayPal awarded him a sum of 10,000$ Read More..

Join In!

RHA © 2013. All Rights Reserved.