WE OFFER THE BEST HACKING SOFTWARE, CYBER-TERRORIST TOOLS, REVENGE FULFILLERS, DEATH INCARNATORS, AND OTHER HERETIC, ANTI-CHRIST ACCESSORIES, AS WELL AS ALL THE INFORMATION AND INSTRUCTIONS YOU NEED TO START YOUR CAREER IN HACKING.

CHECK OUT OUR CYBER-
TERRORIST TOOLS, IRC,
ICQ, Trojan Horses, Java Virii, Dial 
Rippers, tracers, and other deadly 
weapons.
Before you go ahead and download 
the software we suggest you read 
our "DISCLAIMER" target on
this page; it
contains all the hints of hacking 
which would really help in your 
future hackng career.
WHAT DO YOU WANT TO HACK 
TODAY?:
Protected Windows 3.x
Protected Windows 9x
Linux
Someone's Internet account
IRC
Telstra Big Pond
Hack any ISP you want !

IRC / Nukers -- have you ever wished you can kick or ban someone you hated...
DALnet linklooker for mIRC
LINK LOOKER
LINK LOOKER
CLICK NUCKER 2.2
WinNuke 95
VOOB
BitchSlap
ICMP Watch
NUKE v2.3
NukeNabber v2.9

ICQ -- a collection of handy tools to hack and take over ICQ
ICQfucker
ICQnewQ3
ICQnuker
ICQbomber98  (flooder)
ICQflooder   (flooder)
ICQrevenge (flooder)
ICQzap  (flooder)
ICQwatch v0.6
ICQPortSniff
LAMETOY
Dark ICQ
ICQ99a Cracker
xICQ

TROJAN HORSES -- files that act not the way they are supposed to
CRACKER JACK 1.4  unix password cracker
Back Orifice
NetBus v1.7
Deep Throat
Sockets De Troie
GirlFriend
Master's Paradise
JAVA VIRII -- virii that can be downloaded straight from a web page

DIAL RIPPERS -- these parasites ripp the dial-up password

TRACERS  -- Finger cliens, ping analysers, INTERNIC database lookups
HOST / IP LOOKUP informs of IP address and location

OTHERS -- Misc. tools which do not fit into any of the above categories, still very useful
AMI-BIOS password informer
ZIP CRACK archive password informer
BOX TONE tricks tone dialing phones
ANONY MAIL   ano mail sender
WINSOCK 2
NTFS DOS   accesses ntfs from dos



 

Protected Windows 3.x
In extreme cases hacking Windows 3.x may require some effort, but most of the time, especially when Administrators decide to use Netware, it is fairly simple.
The easiest way is through Encarta  (95 and 96 definetly work) - while in Encarta click the little symbol that looks like the letter < i >   (located on the menu bar).  On the pull down menu, hit "About Encarta...".
Immediatelly you will see a screen with 5 tabs on the bottom - select the one with "System Information" on it.
From there on it's obvious.
If for some strange reason Encarta is unavailable, or some options are greyed out, go to the Netware properties.  You can find that in any Windows application - <File>, <Open>, <Network>.  When the program loads you'll see dozens of options, and probably a <Run> menu.  If your Administrator hid the "command.com" or whatever file, you can try to find it using a <Find> command, or through a standard windows file tree.

If you have a clever Administrator, you may find the matter a bit harder, but don't worry.  If the system is equiped with Netscape Navigator (v2.0 and above definetely work) or Brittanica Encyclopaedia (which uses NN as a browser), go into it.
In the <Edit>, <Preferences> menu you will see a set of tabs or a tree.  Select "Applications" or "File Types", or something like that.  You must make a new type of file and associate it with an internal viewer, so Netscape can automatically spawn a viewing application when it recognises the entered file extension.
To do that hit <New Type...>.  A dialog box comes up listing 4 fields.  below is an example of a created file type that will spawn a dos viewer:

Description of type: DOS Application
File extention: COM
MIME Type:   (not necessary to enter anything in that field)
Application to use:  c:\windows\command.com  (or wherever the application is located)

After you have completed the fields select <File>, <Open Page> or similar and type in the program file name, e.g: format.com, label.com, or command.com.
If everything else fails, I suggest that you open any word processor, and edit the "autoexec.bat" or "config.sys" files.



Protected Windows 9x
Hacking Windows 9x is so easy - it's not  funny, and I shouldn't be even talking about it.  But since you chose to visit our site, and clicked on this section, I figure you have  a pretty good reason.  So here goes:
All Windows applications, well most of them, utilise a <File>, <Open> command which displays a browse style file table, which displays all unhidden files on the hard drive.  Now it's only a matter of right-clicking on any important to the system or your victim file, and selecting one of the marvelous destructive options.  If you want to permanently delete a file, I suggest hitting <SHIFT> + <DEL> keys at the same time.  After you answer 
<Yes to all> at the prompt, all targeted files will wiped.
If the drives are unavailable or hidden, you can access them by typing in their exact location in the 
<File name> field
If the above method fails I suggest you use the good old EDIT-THE-FILE trick, and and edit the "autoexec.bat" or "config.sys" files, or even worse, the system registry.  But remember, when wrecking the registry you need to edit 4 files:
c:\windows\user.dat
c:\windows\user.da0
c:\windows\system.dat
c:\windows\system.da0
But before you attempt that remember, the above files have to be unprotected first.  That can be done by issuing the following command at the DOS prompt:
>    attrib -h -s <filename>


Linux
Linux is so well protected that hacking may seem almost impossible, in fact a clever system Administrator can completely elliminate any chance of hacking the system.  Nevertheless a good Hacker is better than a good Administrator.
You see, all passwords for all login accounts are stored in the /etc/passwd file.  They are well crypted  and the file's permission is read-only for all users apart from "root".  I, however, have developed a hacking strategy that relies on a trojan horse virus which targets curious users.

STEP 1
Our first task is to make the /etc/passwd file read-write, and that's where the trojan horse kicks in.
The trojan horse is a batch file or a C++ program  which can be created by almost anyone.  The batch file must have the following requirements:
-must execute "chmod 666 /etc/passwd"
-must execute a program which directly relates to the name of the file
-must have a name which would attract the Administor  (e.g. XDoom)
-must be placed in a directory where it can be noticed by the Administrator, I suggest placing it in "/bin" directory, and naming the file "dir", so the Administrator will execute sooner
Please allow up to one week for the Administrator to execute the virus

STEP 2
Once you're sure the file's permission is set to read-write, it is time to edit the "/etc/passwd" file.
Make sure you make a backup of the file before editing.
Once the file is opened you will see a lot of garbage (system configurations), and highly crypted passwords followed by the login names.
This is the point where most hackers stumble, not knowing what to do next.  They don't know how to decypher the password strings, but don't worry, even I don't know that.  Instead I avoid the problem by going around it.
Theoretically all you have to do is to copy the encrypted password string which corresponds to your login account.  Then highlight the password string which corresponds to the victim's account and replace it with the previously copied string.  Now save the changes and exit.
Once you're done, login with your victim's login name.  In the password field enter your password, and you're in.

STEP 3
After a careful examination of the "/etc/passwd" file, the Administrator can notice the match between your crypted password string and that of your victim's, therefore you may get busted, fired, or even spend some time in jail.
Fortunatelly there is an easy way out.  Remember the time when you made a backup of the file before editing it... Well now you can replace the edited file with the backup copy, and save your ass.
If you need more security I suggest that you create a fake login account prior to hacking, and memorise the password.  So when its time to hack, you can replace the victim's password string with that of your fake login accout.
Although this method may seem a little time consuming, it is extremely effecient, and will work in 99.8 % of the times.  The other 0.2 % depend on the Administrator's intelligence.  By the way, this method can also be used to hack the "root" account.  So, how does it feel to become the SuperUser ?!?
 



Someone's Internet Account
If your victim caches his Internet password, you're lucky.  You can use a DialRipper to grab the password stored away somewhere in a dark corner of the registry.  You can give him a trojan horse in form of a batch file or a simple COBOL program, with the following requirements:
-must execute the DialRipper
-must execute a program which directly corresponds to the name of the file (which would interest the victim)
-must copy the *.tmp file created by the DialRipper (which holds the account details) into a safe place, or a   floppy disk
After you regain possetion of the disk, find out the dial-up number of your victim's ISP, and use his accont details (stored on the disk) to log on.

If your victim does not cache his password, and stubbornly enters it each time he wants to connect, you may be not as lucky, but don't worry.  You can use a key stroke recorder together with a hider in the form of  a trojan horse (as mentioned above to to record his password as he types it in).  This method is not as effective as the first, although, one day it may turn out to be your last resort.



IRC


TELSTRA Big Pond
Although hacking Telstra may be relitively easy, it is extremely dangerous, and I cannot be held responsible for any of your actions.  If you really want to know how it's done, and perhaps try it for yourself, I suggest you run a Jammer software on your modem prior to hacking.
If you don't have a trial CD from TELSTRA, ring them and ask for one.  After you get it, run it and choose to create a new acount with TELSTRA, when asked fill out a fake name, address and phone details.  When they ask you for a credit card number, use the Credit Card Wizard to provide the ISP with a fake, but algorithmically possible credit card number (either VISA or Master Card).  When your account applicatoin is accepted, and you choose to automatically customise the internet settings, a connection window will popup.  Before you connect make sure to click on <Settings> and enter  "1831" (anonymous call request) before the dial-up number.  After you're done, enter the password and log on.
Altough you logon twice, you only have to pay for one phonecall   (the first dial is a 1800 number).
You can use this "free" service for a few hours each logon    (usually untill 9:00pm in an evening logon, and throughout the night if you log on after 9:00 pm, maximum 5 hrs per logon, 20 mn idle time).
If you choose to continue using this service, you have to enter new fake details every time you log on, and try not to use similar passwords all the time.
Although this may seem a bit time consuming (actually takes around 4 mins), the service is excellent  (by far the best in Austraila), and since the price is $ 0.00, it really pays off.

Hack any ISP you want !
This may sound crazy, but let me assure you its not !  The methods described below really work, but first let me tell you this: when I tried it, I get 8 people's passwords in one day.  This is also good for making money, since you can sell the dial-up accounts to people who cannot afford to pay big bucks for monthly internet access.
OK, back to business.  This method is based on convincing your victim to send you his/her dial-up logon and password via e-mail.  You may think "who is that stupid ?!"  Indeed you're right, but it takes only the most clever hoax to convince even the smartest of the internet surfers out there.
In order for this hoax to work, you need to design a web page which would advertise a way to hack a popular ISP.  Please look VERY CAREFULLY at the example shown below:
 

HOW TO HACK TELSTRA BIG POND
Free Internet,  Free Internet,  Free Internet,  Free Internet,  Free Internet,   Free Internet

 
If you are an Australian resident, you would probably have realised that Telstra BIG POND is the best ISP.  It is considered so for many reasons:
  • Fastest ping response
  • Top FTP downloading times
  • Best HTML speed
But a problem with BIG POND is: they are just too expensive, and they are too easy to hack.

HOW WOULD YOU LIKE TO HACK INTO TELSTRA, AND HAVE FREE INTERNET FOR THE REST OF YOUR LIFE !!!

Well, its very simple, at least it worked for me.  But you do need an Australian ISP with a valid account.
Use the steps below to setup the hacked account in a matter of minutes.
Follow these steps exactly for a successful hack of Telstra BIG POND.
We recommend you to Copy and Paste the text below so you don't make a mistake.

STEP  1
Send an e-mail to:  [email protected]
with the text mensioned in steps below
STEP  2

In the subject field type in: 
CTK-request password=current e-mail address=recipient_ID=password.dat
Replace the field "current e-mail address" with your current e-mail address provided to you by your current ISP.

NOTE: You cannot use a freebe mail server eg. yahoo, hotmail, netspace, mailusa, or any other free mail service.  It must be a valid e-mail address povided by your ISP, otherwise the bot at Telstra will automatically reject it.

STEP  3

In the message field copy and paste the following and replace the highlighted fields:

<HTML>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<body>
<META HTTP-EQUIV="Content-Type" CONTENT="unrestricted>
<login>
<recipient_login_ID>
<login_passwd=YOUR ISP PASSWORD=dockable=request::public void=CTK>
</login>
<local_member_classes>
<member_login_ID=YOUR VICTIM'S LOGIN NAME=dockable>
<send_field=password.dat; send_to_recipient>
</body>
</html>

YOUR ISP PASSWORD - replace this field with your current ISP password which you use to login to the Internet every time you connect.  Must be valid otherwise the bot will reject this message.

YOUR VICTIM'S LOGIN NAME -  replace this field with the login name of your victim - the guy you wanna hack.  If you don't know such a person replace the field with an obvious name, such as superman, batman, predator, loony, etc, and you'll surelly hack someone.

Your victim's password will be fetched for you by Telstra BIG POND and should arrive in your e-mail   (the one you specified)  within 24 hours.

PLEASE READ THE INFORMATION BELOW - IT IS CRITICAL TO HACK TELSTRA BIG POND

NOTE:  Although you have to wait up to 24 hours for the password to arrive, the wait is really worth it !!!  Believe me, having TELSTRA as your ISP is excellent, especially since it's free
It personally worked for me, and I had to wait less than 2 hours before the password arrive.
By the way, Telstra Dial-Up number for the Sydney area is: 9296-5000, and since Telstra thinks you are just an everyday customer they will not attempt to trace you.
The reason that the bot requires you to enter your ISP e-mail address and your valid passwords is because it is very wary, and needs to validate whether or not your user_ID really exists.  It does so by directly contacting your ISP and verifying your login name and password.

DISCLAIMER: This method has been thoroughly tested by hackers throughout Australia and has been reported to work 100% of the times.   None of the hackers participating in the above examination have been traced or caught.
This is a non-profit site aimed to provide unrestricted Internet access to all mankind.

HAPPY HACKING....
 

Now lets carefully analyze the above example.  At first the page advertises the ISP, says how good it is, etc.  Then it mentions that the ISP has a major weakness - it is easy to hack!  By this time the victim is convinced that hacking this ISP is no problem.  Then it askes the user to send an e-mail to [email protected], and says that a bot at TELSTRA will recieve it.
Notice how it asks the victim to set the subject to: 
CTK-request password=current e-mail address=recipient_ID=password.dat
 it then asks the victim to replace the "current e-mail address" field with his/her current e-mail address, given out by the ISP that they're currently using.  This technique is used to  find out the person's login name, which is the name preceeding the "@" sign.
The victim is then required to paste the following code into the message:
<HTML>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<body>
<META HTTP-EQUIV="Content-Type" CONTENT="unrestricted>
<login>
<recipient_login_ID>
<login_passwd=YOUR ISP PASSWORD=dockable=request::public void=CTK>
</login>
<local_member_classes>
<member_login_ID=YOUR VICTIM'S LOGIN NAME=dockable>
<send_field=password.dat; send_to_recipient>
</body>
</html>
Obviously this HTML script is a load of bullshit, and of course it doesn't work (there is in fact no way of hacking into TELSTRA, but if you know of a way - send me an e-mail to: [email protected] ).  The reason that the code is there is to make sure the victim doesn't think that it's too easy, otherwise he/she might get suspicious!
The victim is asked to replace the field "YOUR ISP PASSWORD" with his/her valid password.
Next, the victim is asked to replace the field "YOUR VICTIM'S LOGIN NAME" with the name of their "victim".
The most important bit is that the e-mail address [email protected] is owned by me, but when its your turn to hack you can get an e-mail address with a freebe server such as fastermail, hotmail, or yahoo.  DO NOT USE you current ISP e-mail account.
At the end of the page it tells the user to wait up to 24 hours for the account to be hacked, this is necessary because otherwise the victim might get suspicious and might even change his/her ISP password, but if you give them 24 hours to wait, that will be more than enough for them to forget all about their hacking attempt.
The hardest thing about all this is probably to find a way to advertise the website with the hoax, but I recommend you use "HAKERS100", which is a modified mIRC client, which allows you to SPAM messages throughout any channels, even if you're banned from them.  Of course there are other methods, but this one proved to be the most effective.
P.S. I liked this method so much - I didn't want to put it on the internet, but since this is a hacking klan, and all hackers are brothers (and sometimes sisters), I decided to share my knowledge.



DISCLAIMER:
CYBERIA | TerrorNet is a non commercial organisation, and does not claim the ownership of any graphics, pictures or articles on this web site, unless otherwise noted.  If you wish to include any part of CYBERIA | TerrorNet on your web site, you may do so at your own risk, as some of the pictures featured on CYBERIA | TerrorNet or any of its adjacent sites / channels may be copyrighted by their respectful owners.
CYBERIA | TerrorNet does not hold any responsibility for any damage or data corruption to any computer caused by any of the programmes freely available from CYBERIA | TerrorNet.  If any of the programmes on CYBERIA | TerrorNet were willfully used for the purpose of hacking (which they should), the hacker must take full responsibility for any of his/her actions.