Hack Worm
8.19K subscribers
862 photos
43 videos
27 files
1.21K links
πŸ”° Learn Ethical Hacking From Scratch πŸ”°

βœ” Premium Hacking Video Tutorial
βœ” Premium Hacking Software
βœ” Black Hat Techniques & much more
Download Telegram
Hack Worm pinned Deleted message
πŸ’’ DNS Spoofing πŸ’’

DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones. One of the reasons DNS poisoning is so dangerous is because it can spread from DNS server to DNS server.

βž– @HackWormAdmin βž–
Ⓜ️ DHCP Ⓜ️

πŸŒ€Dynamic Host Configuration Protocol (DHCP) assigns IP addresses dynamically. This means that you do not have the same IP address all of the time. Most of the time, these IP address assignments are on a local area network. Remember, on LANs we use private IP addresses. When each device is connected to the LAN, it must request an IP address. That device sends that request to the DHCP server that then assigns an IP address to that system for a fixed length of time known as a "lease."πŸŒ€

βž–@HackWormAdminβž–
312-50 Certified Ethical Hacker Certified Practice Exam
Attend this 312-50 Certified Ethical Hacker Certified Practice Exam Then U will get a Good Score 80% on Main Exam

Coupon LInk
http://bit.ly/2P1AycL

πŸ“Education That Matters
πŸ”° VMware Workstation 15 Pro Activation πŸ”°

πŸ”˜Lifetime License For Multiple PCs

πŸ’’Activation Code:- YA1J2-DDG5K-08DHZ-6XQXT-Q3UW8

Note: For Those who use kali linux in vmware
πŸŒ€ CLASSIFICATION OF HACKERS πŸŒ€

Based on the attitude and skill level they possess, hackers are classified into the following types:

πŸ”° White Hat Hacker: A white hat hacker (also known as ethical hacker) is someone who uses his skills only for defensive purposes such as penetration testing. These type of hackers are often hired by many organizations in order to ensure the security of their information systems.

πŸ”° Black Hat Hacker: A black hat hacker (also known as cracker) is someone who
always uses his skills for offensive purposes. The intention of black hat hackers is to gain money or take personal revenge by causing damage to information systems.

πŸ”° Grey Hat Hacker: A grey hat hacker is someone who falls in between the white hat and black hat category. This type of hacker may use his skills both for defensive and offensive purposes.

πŸ”° Script Kiddie: A script kiddie is a wannabe hacker. These are the ones who lack the knowledge of how a computer system really works but use ready-made programs, tools and scripts to break into computers.

βž– @HackWormAdmin βž–
Ⓜ️ CYCRIPT Ⓜ️

πŸŒ€Cycript remains one of the best hacking tools to be used on iPhones. It enables developers to associate with applications running on iOS. The programming is done through Objective-C++ and JavaScript language structure. It highlights tab finishing and language structure features, giving it a practical and desktop-like feel.πŸŒ€

βž–@HackWormAdminβž–
πŸ”° The difference between KL and RAT πŸ”°

πŸŒ€RAT= Remote Administrative Tool.It gives a hacker full control over a victims computer.Webcam,Microphone,And what not.RAT's violate a whole heck of Cyber laws that is why FBI puts heat on them and they get caught,Mainly because blackmailing or using their personnel information against them

πŸŒ€KL= Keylogging/Keylogger.It sends keystrokes and Stealer logs containing username,password and website link typed and/or visited by a victim to the hacker that made it.

βž– @HackWormAdmin βž–
XssPy.zip
4.9 KB
πŸ”° XssPy Tool πŸ”°

Ⓜ️XssPy is a web application XSS scanner. Xsspy was recently used by an engineer at microsoft to find a bug in Pentagon’s Bug Bounty Program.

βž– @HackWormAdmin βž–
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software.

https://github.com/Screetsec/TheFatRat

Command:

1. git clone https://github.com/Screetsec/TheFatRat.git

2. cd TheFatRat

3. chmod +x setup.sh && ./setup.sh
πŸ”° Pen TestingπŸ”°
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional hackers who will try to hack your system and show you the loopholes that you should fix.

Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters βˆ’

what will be the time of penetration test,

where will be the IP source of the attack, and

what will be the penetration fields of the system.

Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible.

Types of Penetration Testing

We have five types of penetration testing βˆ’
Black Box βˆ’ Here, the ethical hacker doesn’t have any information regarding the infrastructure or the network of the organization that he is trying to penetrate. In black-box penetration testing, the hacker tries to find the information by his own means.

Grey Box βˆ’ It is a type of penetration testing where the ethical hacker has a partial knowledge of the infrastructure, like its domain name server.

White Box βˆ’ In white-box penetration testing, the ethical hacker is provided with all the necessary information about the infrastructure and the network of the organization that he needs to penetrate.

External Penetration Testing βˆ’ This type of penetration testing mainly focuses on network infrastructure or servers and their software operating under the infrastructure. In this case, the ethical hacker tries the attack using public networks through the Internet. The hacker attempts to hack the company infrastructure by attacking their webpages, webservers, public DNS servers, etc.

Internal Penetration Testing βˆ’ In this type of penetration testing, the ethical hacker is inside the network of the company and conducts his tests from there.

Penetration testing can also cause problems such as system malfunctioning, system crashing, or data loss. Therefore, a company should take calculated risks before going ahead.
πŸ”° RedEye Phishing Tool πŸ”°

Ⓜ️RedEye the advance phishing tool. It is the most complete Phishing Tool, with 33 templates. This tool was made for educational purposes.

βž– @HackWormAdmin βž–
RedEye.zip
13.2 MB
πŸ’’ iKeyMonitor iPhone Hacker πŸ’’

πŸŒ€The iKeyMonitor iPhone Hacker was originally designed for key monitoring, as the name suggests. This means listening to keystrokes in order to look for patterns that might provide clues to passwords and similar. However, it has since grown to handle a huge number of different impressive features. These include listening to the iPhone’s surroundings, spying on call histories, and monitoring iOS usage completely in secret.πŸŒ€
πŸ”° John The Ripper πŸ”°

Ⓜ️ John the Ripper is often used in the enterprise to detect weak passwords that could put network security at risk, as well as other administrative purposes. The software can run a wide variety of password-cracking techniques against the various user accounts on each operating system and can be scripted to run locally or remotely. Ⓜ️

Ⓜ️ Originally developed for Unix-derived systems, John the Ripper is available for most common platforms. The free and open source (FOSS) version is generally distributed as source code. A commercial version, John the Ripper Pro, is a more user-friendly version distributed as native code for a given system. Ⓜ️

βž– @HackWormAdmin βž–
πŸ”° Steps To Perform SQL Injection Using Havij Pro SQL Injection Software πŸ”°

1⃣Step 1 – Run Havij.exe The software will open a window for you. At β€˜Target’ field enter your SQL vulnerable URL – http://www.radiomiriam.com.br/noticia.php?id=5084

2⃣Step 2 – Hit β€˜Analyze’ button here.
Havij will start SQL injection to the target URL you have provided.

Havij analyzing Target Site
It perform queries to analyze IP, web server, PHP version, Database MySQL version. Then, using Insertion type (β€˜) string, it proceeds to find column count, column string, finally Database name. ( Check LOG window)
After it finds out Database name, Status becomes Idle saying β€œI’m IDLE”.

3⃣Step 3 – Now, from above, go to Tables >> Get Tables. Make sure, the database is selected in the respective screen.
Havij Pro will fetch all the tables for the selected Database.

4⃣Step 4 – Tick the table which you finds important regarding your aim and click Get Columns button. For example, here, I want to know username, password and email ID of this site. So, I have to tick β€˜adminβ€˜ and ’emails’ table and then click β€˜Get Columnβ€˜ button.
This step reveals all the columns in selected table.

5⃣Step 5 – Finally, select important columns of a table (for ex., admin) and click β€œGet Data” button.
In my case, admin table has columns – id, nome (name), email, senha (password), and nivel (level). (Website is Spanish) As all these columns’ details are important to me so, I selected them all and clicked β€œGet Data” button.

Username Password Hacked Using Havij Pro
Hence, you can see the result that name, email, password, user ID everything is revealed. Havij Pro have SQL Injected the website and if a hacker want, he can just go ahead using these important confidential information to hack a website.

βž– @HackWormAdmin βž–
πŸ’’ FlexiSPY πŸ’’

FlexiSPY is one of the most advanced iPhone hacking tools in the market. It has some of the most advanced features amongst all other apps. It has the ability to let you listen to live phone calls or record them in secret. You can also activate the microphone so you can listen to what’s happening in the surrounding, or take secret pictures with the camera. However, the reason FlexiSPY is so low in this list because jailbreaking the iPhone is necessary. Furthermore, even the basic package of FlexiSPY is a lot more expensive than the top-end packages of other apps.

βž–@HackWormAdminβž–
Script for penetration testing
----> Websites
----> Exploit Scanner
----> vulnerable
----> Find Admin pages

Git: github.com/AlisamTechnology/ATSCAN

βž–@HackWormAdminβž–
Learning Shell Scripting: How to Automate Your Tasks
Learn how to Automate Your Tasks using shell programming and solve real-world problems using Bash Scripting

Wirte your first Shell Script
Use Shell Script to Automate Tasks. Such as Collect thousands of Developer Emails from Github
Solving real-world problems with shell scripts,
Deep knowledge of linux command


http://bit.ly/2DoSSb1
Enroll as soon as possible
Media is too big
VIEW IN TELEGRAM
πŸ”° How criminals can clone your cards πŸ”°
Be aware of this ‼️
Stay safe‼️

βž– @HackWormAdminβž–