Hackers Of Cyber Lake

A Basic Platform for Begineers to be an Advance level Hacker/Security Administrator. !

Hackers Of Cyber Lake

A Basic Platform for Begineers to be an Advance level Hacker/Security Administrator. !

Hackers Of Cyber Lake

A Basic Platform for Begineers to be an Advance level Hacker/Security Administrator. !

Hackers Of Cyber Lake

A Basic Platform for Begineers to be an Advance level Hacker/Security Administrator. !

Hackers Of Cyber Lake

A Basic Platform for Begineers to be an Advance level Hacker/Security Administrator. !

Tuesday, 11 August 2015

One more Android Vulnerability Discovered

    As we all know that before few days one exploit was founded in android that was affected most of the devices in android. And now letest exploit founded by one Anon researcher. It has affected near about 55% + android devices Read more here :-

Researchers have now warned of another critical security hole in Google’s Android mobile operating system platform that impacts over 55 percent of all Android users.

Security researchers at IBM have discovered a new privilege escalation vulnerability in the Android platform that could allow “a malicious app with no privileges the ability to become a ‘super app’ and help the cybercriminals own the device.”

Dubbed the Android serialization vulnerability, assigned CVE-2015-3825, affects Android versions 4.3 and above, including the latest build of Android M.

The vulnerability resides in a component of Android’s platform called OpenSSLX509Certificate, which can be exploited by an Android app to compromise the system_server process and gain powerful system-level access on the Android device.

In a video, the researchers showed proof-of-concept attack, demonstrating how they were able to exploit the flaw using a malicious app and replace it with the real Facebook app to steal social networking login credentials.

Once the user runs that app with no apparent special privileges, it then download additional code to overwrite the existing app, loaded with an exploit used to escalate permissions using the vulnerability.


Found that video from here :-

https://www.youtube.com/watch?v=VekzwVdwqIY

Saturday, 10 January 2015

File compressor

Step by step instructions to Compress 1gb File Into 1 MB

The most effective method to Compress 1gb File Into 1 MB

Step 1) First of everything you need to download a product to layer records that is KGB Archiver.

For Download Click Here

Step 2) So now introduce it in your machine.

Step 3) Choose an alternative to pack documents and afterward click next.

Step 4) Select 'file sort " keep it as KGB and after that most extreme layering level.

Step 5)then you need to choose the documents or record to clamp.

Thursday, 1 January 2015

You Can't think That What can being Done By Virus/Worm/Trojan..!!

You Can't think That What can being Done By Virus/Worm/Trojan..!!
It can Do Anythink Like --->>
- You may Remotly Hacked By someone
- Attacker Can delete/replace Your File with perticular Formate
- Attacker can stop your Internet also...!!
That's why you must have to know That what is Virus/Worm/Trojen...
My one Friend/Designer Amrish Kakadiya Made a Perfect Video just of 3 minuts only for This all 3 Enemies of our Computers..!!
click here to show this video..---->>


Sunday, 28 December 2014

How to Hack any Android, iPhone and Blackberry Mobile

How to Hack any Android iPhone Blackberry How to Hack any Android, iPhone and Blackberry Mobile
The most effective method to Hack any Android iphone Blackberry How to Hack any Android, iphone and Blackberry Mobile

Today, i'm discussing how to hack any Android, iphone and Blackberry cellular telephone. Meets expectations, a considerable measure like your normal RAT. You may arrange a Xampp; server on your machine and once individuals introduce your application you can control them from your own telephone. You can read all there messages, contacts and get shell access.

Lets begin,

NOTE: whatever is left of the excercise will be for Android telephones, yet can undoubtedly be designed to hack Iphone/Blackberry's as well. my Android Phone)

Prerequisites:

1. Backtrack 5 r3 (utilizing backtrack for this sample as SPF is preinstalled), i as of late posted an article, how to download, introduce and run backtrack 5 in windows.

2. Portforwarding (on the off chance that you are utilizing this outside of your own system)

3. Xampp for linux (manual for introducing this will be in the excercise)

4. A telephone (for instance I will be utilizing my Android Phone)

Step 1) Installing Xampp:

Most importantly, go Here to get Xampp.

Once xampp has got done with downloading, go to your home registry and you ought to have a record called "download.php?xampp-linux-1.7.3a.tar.gz" rename it to something like "xampp.tar.gz".

In your terminal window run

tar xvfz xampp.tar.gz -C/pick

Everything ought to be introduced and you can discover xampp in/pick/lampp/registry.

Step 2) Configuring Xampp:

Utilization

/pick/lampp/lampp begin

/select/lampp/lampp stop

To begin and stop the Xampp administration

Once Xampp has begun, go to "localhost" in your program and select your dialect. Explored to "Phpmyadmin" and make another database called "system".

Next include another client by setting off to the "benefits" tab then "include another client".

Utilize whatever username and secret word you need and select "neighborhood" from the hosts list.

Verify you "Check All" worldwide benefits, then click go.

Presently erase the htdocs organizer in/pick/lampp/

Step 3) Configuring SPF Files:

Explore to the SPF config document

/pentest/misuses/cell phone pentest-system/frameworkconsole/configand Replace

Ip Address For Websrever – with your nearby/open ip.

Ip Address TO Listn on for Shells – with your nearby/open ip.

Ip Address of SQL Server 127.0.0.1 if Localhost – with 127.0.0.1

Username of the MYSQL User to utilize – with the username you made in phpmyadmin

Watchword of the MYSQL User to utilize – with the secret key of the client you set.

Step 4) Configuring SPF:

Open up the cell phone pentest-structure window by going to:

applications>backtrack>exploitation tools>wireless abuse tools>gsm exploitation>smartphone-pentest-structure.

Select choice 4 then select alternative 2.

Info your telephone number, then enter a 7 digit control key to unite with your victimized people and afterward enter the way you need your application to found on your webserver (I will be utilizing/). Presently don't anticipate that anything will happen simply yet, you have to design your telephone with SPF.

Place the document:

/pentest/abuses/cell phone pentest-structure/Frameworkandroidapp/canister/Frameworkandroidapp.apk

What's more move it over to your telephone by transferring it to dropbox or simply associating your telephone to your machine.

Introduce it then open it up. Put in the subtle elements you rounded out a moment prior in

SPF and your ip the webserver is setup on and press setup.

Step 5) Attacking People:

Open up cell phone pentest-system and select choice 6 then pick between the immediate download (simply sends a content to the individual from your telephone with an immediate download to the record) or customer side shell (utilizes a program misuse as a part of android telephones to provide for you shell access).

In the event that you choose alternative 1 you must move the record

/pentest/misuses/cell phone pentest-structure/Androidagent/receptacle/Androidagent.apk

To your root index.

When you get a victimized person, simply open up cell phone pentest-structure once more, select choice 1, fill in the subtle elements and you can then control the victimized person from your cellular 

10 Best Hackers of The World

In the realm of web where we get the worldwide network, it is far simpler to break into somebody's close to home zone. By individual, we don't simply mean the online networking. The internet which has turned into the center point of putting away and restoring data, considared to be the most secure vault, is a minor toy in the hands of a couple of machine virtuosos. Programmers, Black Hat Hackers, reprobates, wafers, digital hoodlums, digital privateers as they are extraordinary, toss a vindictive programming or infection at a framework to increase the right to gain entrance to the coveted information.here are best 10 programmers or the egotists who put the world in wonderment with their ability.



1. Gary McKinnon


2. LulzSec


3. Adrian Lamo


4. Mathew Bevan and Richard Pryce


5. Jonathan James


6. Kevin Poulsen


7. Kevin Mitnick


8. Anonymous


9. Astra


10. Albert Gonzalez


Wednesday, 17 December 2014

Project Neptune (BEST KeyLogger) - COMPLETE Setup Tutorial

Project Neptune (BEST KeyLogger) - COMPLETE Setup Tutorial 

Hi! For one thing, I'd like to tell you that all credits for the genuine keylogger goes to Thyonic. 

Trust you like My this Tutorial. I posted the keylogger a while back and it rapidly turned into the most mainstream keylogger on Hack Forums inside a month. It's still being developed right up 'til the present time, and it will naturally upgrade on start up if there is a redesign accessible. 

Note: Most of these pictures are out of date. I'll get around to overhauling them sooner or later soon. Much obliged! 

Since that is off the beaten path, to the excercise! 

{project Neptune} 

http://www.project-neptune.net/ 

- Download Information - 

Download join: http://www.project-neptune.net/download/ 

What precisely makes this keylogger so uncommon? 

Basically, it is a standout amongst the most steady, professional, and all around elegantly composed lumberjacks around. It gives careful consideration to the minor subtle elements and offers a lot of gimmicks. 

- Tutorial - 

Step One - Downloading 

Most importantly, verify you go to the connection above to download it. You will require Winrar to concentrate it. 

After you have downloaded Project Neptune, just modifiable the envelope containing all the records to your desktop, in the same way as demonstrated:

Project Neptune (BEST KeyLogger) - COMPLETE Setup Tutorial

---
Step Two - Setting Up Log Storing 

Most importantly, you need to choose what you need to use to store 

logs. For email, I suggest utilizing Gmail, and you can 

make a record for that here: 

https://www.google.com/accounts/Newaccount?service=mail 

This excercise will be utilizing Email, particularly Gmail, yet in the event that you need to utilize FTP, utilizing Drivehq, its free and permits a considerable measure of storage:http://www.drivehq.com/secure/Freesignup.aspx 

After you are carried out making your Gmail record, examine the picture underneath: 



Step Three - Setting Up System Settings 

There isn't much to do on this tab, however I'll give a little clarification on what everything does: 

Number 1 - These choices essentially handicap taskmanager's capacity to end your server's methodology. In the event that you enact any, pick the last one, it has the littlest suspicion level! 

Number 2 - This is for blocking sites, however be exhausted, in light of the fact that it obliges administrator rights and will crash in the event that it doesn't have it. Right click on the crate to include destinations. 

Number 3 - All of these choices are clear as crystal, however be cautioned: they oblige administrator rights and will result in the server to crash if the customer doesn't have administrator rights. Mouse over them for more data. 



Step Four - Installation Settings 

This tab is for setting up how your keylogger gets introduced on your customer. You have to soften your document with the goal that it won't get messed around with after it is ran. This is simply a wellbeing peculiarity in the event that you'll be tainting savvy individuals, yet I generally utilize it! 



Step Five - Extra Options 

These are those additional choices that simply make it additionally energizing. Utilize the Fake Error Message in the event that you would prefer not to tie it to something/grave it. 



Step Six - Server Generation 

This is the last step! 

Click on the "Server Generation" tab and feel free to duplicate down the Uninstall secret key - you'll require this on the off chance that you ever test PN out on your machine. After that, feel free to hit "Create New Server" and you're set to go! 

Since you are carried out, your server record ought to be produced if everything went alright. In the event that you have any inquiries, don't hesitate to ask. 

Protip: Click on the following tab and hit "Spare Settings" so you don't need to enter the majority of this each time you utilize it!

Sunday, 14 December 2014

Nmap 6.25 released - Free Security Scanner For Network Exploration & Security Audits

Nmap 6.25 contains several improvements,including 85 new NSE scripts, about 1,000 new OS and servicedetection fingerprints, execution upgrades, for example, the new kqueue and survey I/O motors, better Ipv6 traceroute help, Windows 8 enhancements, and significantly more! It additionally incorporates the work of five Googlesummer of Code assistants who worked full time with Nmap guides amid

the late spring.

Nmap 6.25 source code and parallel bundles for Linux, Windows, and Mac

are accessible free of charge download from:

http://nmap.org/download.html