WE OFFER THE BEST HACKING SOFTWARE, CYBER-TERRORIST TOOLS, REVENGE FULFILLERS, DEATH INCARNATORS, AND OTHER HERETIC, ANTI-CHRIST ACCESSORIES, AS WELL AS ALL THE INFORMATION AND INSTRUCTIONS YOU NEED TO START YOUR CAREER IN HACKING.
CHECK OUT OUR CYBER-
TERRORIST TOOLS, IRC, ICQ, Trojan Horses, Java Virii, Dial Rippers, tracers, and other deadly weapons. Before you go ahead and download the software we suggest you read our "DISCLAIMER" target on this page; it contains all the hints of hacking which would really help in your future hackng career. |
WHAT DO YOU WANT TO
HACK
TODAY?: Protected Windows 3.x Protected Windows 9x Linux Someone's Internet account IRC Telstra Big Pond Hack any ISP you want ! |
IRC
/ Nukers -- have you ever wished you can kick or ban someone you hated...
DALnet
linklooker for mIRC
LINK
LOOKER
LINK LOOKER
CLICK NUCKER
2.2
WinNuke
95
VOOB
BitchSlap
ICMP Watch
NUKE v2.3
NukeNabber
v2.9
ICQ
-- a collection of handy tools to hack and take over ICQ
ICQfucker
ICQnewQ3
ICQnuker
ICQbomber98
(flooder)
ICQflooder
(flooder)
ICQrevenge
(flooder)
ICQzap
(flooder)
ICQwatch
v0.6
ICQPortSniff
LAMETOY
Dark ICQ
ICQ99a
Cracker
xICQ
TROJAN
HORSES -- files that act not the way they are supposed to
CRACKER
JACK 1.4 unix password cracker
Back
Orifice
NetBus
v1.7
Deep Throat
Sockets
De Troie
GirlFriend
Master's
Paradise
JAVA
VIRII -- virii that can be downloaded straight from a web page
DIAL RIPPERS -- these parasites ripp the dial-up password
TRACERS
-- Finger cliens, ping analysers, INTERNIC database lookups
HOST
/ IP LOOKUP informs of IP address and location
OTHERS
-- Misc. tools which do not fit into any of the above categories, still
very useful
AMI-BIOS
password informer
ZIP CRACK
archive password informer
BOX TONE
tricks tone dialing phones
ANONY
MAIL ano mail sender
WINSOCK
2
NTFS
DOS accesses ntfs from dos
Protected Windows 3.x In extreme cases hacking Windows 3.x may require some effort, but most of the time, especially when Administrators decide to use Netware, it is fairly simple. The easiest way is through Encarta (95 and 96 definetly work) - while in Encarta click the little symbol that looks like the letter < i > (located on the menu bar). On the pull down menu, hit "About Encarta...". Immediatelly you will see a screen with 5 tabs on the bottom - select the one with "System Information" on it. From there on it's obvious. If for some strange reason Encarta is unavailable, or some options are greyed out, go to the Netware properties. You can find that in any Windows application - <File>, <Open>, <Network>. When the program loads you'll see dozens of options, and probably a <Run> menu. If your Administrator hid the "command.com" or whatever file, you can try to find it using a <Find> command, or through a standard windows file tree. If you have a clever Administrator, you may find the matter a
bit harder, but don't worry. If the system is equiped with Netscape
Navigator (v2.0 and above definetely work) or Brittanica Encyclopaedia
(which uses NN as a browser), go into it.
Description of type: DOS Application
After you have completed the fields select <File>,
<Open Page> or similar and type in the program file name, e.g:
format.com, label.com, or command.com.
|
||||
Protected Windows 9x Hacking Windows 9x is so easy - it's not funny, and I shouldn't be even talking about it. But since you chose to visit our site, and clicked on this section, I figure you have a pretty good reason. So here goes: All Windows applications, well most of them, utilise a <File>, <Open> command which displays a browse style file table, which displays all unhidden files on the hard drive. Now it's only a matter of right-clicking on any important to the system or your victim file, and selecting one of the marvelous destructive options. If you want to permanently delete a file, I suggest hitting <SHIFT> + <DEL> keys at the same time. After you answer <Yes to all> at the prompt, all targeted files will wiped. If the drives are unavailable or hidden, you can access them by typing in their exact location in the <File name> field If the above method fails I suggest you use the good old EDIT-THE-FILE trick, and and edit the "autoexec.bat" or "config.sys" files, or even worse, the system registry. But remember, when wrecking the registry you need to edit 4 files: c:\windows\user.dat c:\windows\user.da0 c:\windows\system.dat c:\windows\system.da0 But before you attempt that remember, the above files have to be unprotected first. That can be done by issuing the following command at the DOS prompt: > attrib -h -s <filename> |
||||
Linux Linux is so well protected that hacking may seem almost impossible, in fact a clever system Administrator can completely elliminate any chance of hacking the system. Nevertheless a good Hacker is better than a good Administrator. You see, all passwords for all login accounts are stored in the /etc/passwd file. They are well crypted and the file's permission is read-only for all users apart from "root". I, however, have developed a hacking strategy that relies on a trojan horse virus which targets curious users. STEP 1
STEP 2
STEP 3
|
||||
Someone's Internet Account If your victim caches his Internet password, you're lucky. You can use a DialRipper to grab the password stored away somewhere in a dark corner of the registry. You can give him a trojan horse in form of a batch file or a simple COBOL program, with the following requirements: -must execute the DialRipper -must execute a program which directly corresponds to the name of the file (which would interest the victim) -must copy the *.tmp file created by the DialRipper (which holds the account details) into a safe place, or a floppy disk After you regain possetion of the disk, find out the dial-up number of your victim's ISP, and use his accont details (stored on the disk) to log on. If your victim does not cache his password, and stubbornly enters it each time he wants to connect, you may be not as lucky, but don't worry. You can use a key stroke recorder together with a hider in the form of a trojan horse (as mentioned above to to record his password as he types it in). This method is not as effective as the first, although, one day it may turn out to be your last resort. |
||||
IRC |
||||
TELSTRA Big Pond Although hacking Telstra may be relitively easy, it is extremely dangerous, and I cannot be held responsible for any of your actions. If you really want to know how it's done, and perhaps try it for yourself, I suggest you run a Jammer software on your modem prior to hacking. If you don't have a trial CD from TELSTRA, ring them and ask for one. After you get it, run it and choose to create a new acount with TELSTRA, when asked fill out a fake name, address and phone details. When they ask you for a credit card number, use the Credit Card Wizard to provide the ISP with a fake, but algorithmically possible credit card number (either VISA or Master Card). When your account applicatoin is accepted, and you choose to automatically customise the internet settings, a connection window will popup. Before you connect make sure to click on <Settings> and enter "1831" (anonymous call request) before the dial-up number. After you're done, enter the password and log on. Altough you logon twice, you only have to pay for one phonecall (the first dial is a 1800 number). You can use this "free" service for a few hours each logon (usually untill 9:00pm in an evening logon, and throughout the night if you log on after 9:00 pm, maximum 5 hrs per logon, 20 mn idle time). If you choose to continue using this service, you have to enter new fake details every time you log on, and try not to use similar passwords all the time. Although this may seem a bit time consuming (actually takes around 4 mins), the service is excellent (by far the best in Austraila), and since the price is $ 0.00, it really pays off. |
||||
Hack any ISP you want ! This may sound crazy, but let me assure you its not ! The methods described below really work, but first let me tell you this: when I tried it, I get 8 people's passwords in one day. This is also good for making money, since you can sell the dial-up accounts to people who cannot afford to pay big bucks for monthly internet access. OK, back to business. This method is based on convincing your victim to send you his/her dial-up logon and password via e-mail. You may think "who is that stupid ?!" Indeed you're right, but it takes only the most clever hoax to convince even the smartest of the internet surfers out there. In order for this hoax to work, you need to design a web page which would advertise a way to hack a popular ISP. Please look VERY CAREFULLY at the example shown below: HOW TO HACK TELSTRA BIG POND
Notice how it asks the victim to set the subject to: CTK-request password=current e-mail address=recipient_ID=password.dat it then asks the victim to replace the "current e-mail address" field with his/her current e-mail address, given out by the ISP that they're currently using. This technique is used to find out the person's login name, which is the name preceeding the "@" sign. The victim is then required to paste the following code into the message: <HTML> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <body> <META HTTP-EQUIV="Content-Type" CONTENT="unrestricted> <login> <recipient_login_ID> <login_passwd=YOUR ISP PASSWORD=dockable=request::public void=CTK> </login> <local_member_classes> <member_login_ID=YOUR VICTIM'S LOGIN NAME=dockable> <send_field=password.dat; send_to_recipient> </body> </html> Obviously this HTML script is a load of bullshit, and of course it doesn't work (there is in fact no way of hacking into TELSTRA, but if you know of a way - send me an e-mail to: [email protected] ). The reason that the code is there is to make sure the victim doesn't think that it's too easy, otherwise he/she might get suspicious! The victim is asked to replace the field "YOUR ISP PASSWORD" with his/her valid password. Next, the victim is asked to replace the field "YOUR VICTIM'S LOGIN NAME" with the name of their "victim". The most important bit is that the e-mail address [email protected] is owned by me, but when its your turn to hack you can get an e-mail address with a freebe server such as fastermail, hotmail, or yahoo. DO NOT USE you current ISP e-mail account. At the end of the page it tells the user to wait up to 24 hours for the account to be hacked, this is necessary because otherwise the victim might get suspicious and might even change his/her ISP password, but if you give them 24 hours to wait, that will be more than enough for them to forget all about their hacking attempt. The hardest thing about all this is probably to find a way to advertise the website with the hoax, but I recommend you use "HAKERS100", which is a modified mIRC client, which allows you to SPAM messages throughout any channels, even if you're banned from them. Of course there are other methods, but this one proved to be the most effective. P.S. I liked this method so much - I didn't want to put it on the internet, but since this is a hacking klan, and all hackers are brothers (and sometimes sisters), I decided to share my knowledge. |
||||