mikepeterson

Members
  • Content Count

    53
  • Last visited

Everything posted by mikepeterson

  1. Thanks for sharing this method. I was looking for it for the past few months.
  2. You can put all these ways together at once and you will be like 98% anonymous while hacking and doing blackhat activities. [hide] 1. VPN that DOES NOT keep any logs! I think MullVad VPN is best as it doesn't keep logs and it's very cheap and fast! Can't beat that... A VPN will make sure your secure while hacking online. It hides your IP address and makes sure you can't be tracked. But a VPN isn't the ONLY thing you should use while blackhat hacking or trying to protect yourself. You should use other tools too to remain 99.9%! I recommend only buying a VPN with Bitcoin so the payment can't be traced. 2. Proxychains on a linux system like kali linux or Tails You should use proxychains to stay anonymous with everything else added too. you can get proxys by scraping or grabbing them. I highly recommend buying like a list of 25 "PRIVATE" socks5 proxy servers. Private ones don't keep logs but if you get free ones that do keep logs then only connect to the proxy if you have your VPN on that doesn't have logs. I recommend making your own proxy grabber that will only grab elite proxies that are mostly all alive. If you can't code your own then you should use netghost to get proxies. It runs on windows but you can always upload it to a file sharing site and get it on your own linux system. The proxy chains location on kali linux is /etc/proxychains.conf [Command is "leafpad /etc/proxychains.conf". Add proxies there . 3. Tails to keep anonymous You can use all the anonymous tips above on a Tails system also. Make sure to run tails off a live USB or DVD. It will ensure more anonymity. You can use tor with tails too so it will make you more hidden. Not much to say with tails. 4. Virtual Machines You can stack virtual machines on top of each other with tails. Then use everything else to hide. Once you do something really illegal then delete all data and be gone. You can also use CCleaner to clean all the logs on the system. Even delete VM iso file and re-download on a different IP. 5. Coffee Shops And Such You can use a raspberry PI connected to a Public wifi. Make sure to stay off property and go like across the street while connected. Use all the stuff above while at the open wifi. You will remain anonymous! 6. CCleaner You can use CCleaner to delete all system logs and just all types of data It will clean everything out your PC then after you use CCleaner to make sure to reinstall it again (Not really needed just an extra layer). 7. Browser Windows If your using chrome or any other browser in the earth then make sure not to maximize your browser window! While using any browser like Tor, Firefox, Chrome or others make sure to keep it small... People can track you by your browser window! Keep safe! 8. MAC Address Change your mac address so you can't be tracked using tools like macchanger on any linux op. Your mac address can be used to get a location on your PC. Make sure to do this too. 9. Webcam Make sure to tape your webcam so none of our fellow Policeman or any other person can see you can get pictures. Short one XD [/hide]
  3. [hide] You will need: ================================================ - Linux server (ubuntu, debian, whatever) - X-Lite Softphone client (for making VoIP calls) - Asterisk (free open source, to be installed on the server) - PBX "host" that allows Caller ID to be set by you (free ones are hard to find) ================================================ SSH into your server and issue these commands: sudo apt-get install asterisk yum install asterisk [*]pick one based on your distro [*] vi /etc/asterisk/sip.conf [*]all asterisk connection info is here [*] [sipuser] type=peer host=dynamic username=allan secret=1234 context=outgoing [*]this is what should be in the config [*]modify it to your own PBX [*]secret is your password [*] vi /etc/asterisk/extension.conf [*]this is were we setup the callerID [*] [outgoing] exten => _1NXXNXXXXXX,1,SetCallerID(2024561111) exten => _1NXXNXXXXXX,n,Dial(IAX2/VoicePulse/${EXTEN}) [*]add this to the end of the config [*]set callerID to whatever you want [*] service asterisk restart [*]save and reload the service (using systemctl or whatever) [*] [*]now fire up X-Lite phone and enter your IP details [*] [*]server ip can be found by issuing this command: hostname -I [*] And you're done. [/hide]
  4. [hide] 1. Find the facebook username of your target and copy it. You will find this in the address bar, for example /john.smith92 or something like that. If they don't have one and it says profile=10202103 or something like that then you'll have to just copy their full name instead. 2. In a new browser or incognito mode go to Forgot Password on Facebook and paste in the username of your target. 3. What will typically pop up options in which to send a forgot password request, either to an email or phone. 4. You'll see their email but it will be starred out. For example j***********@l***.com Copy this into Notepad++ 5. The stars represent the exact # of characters in their email so this can often be easy to find out. Copy the starred out email onto one line and below it type out some variations that match the character length. j***********@l***.com [email protected] These will be the same length in notepad++. 6. It will also show the last 2 digits of their phone # on the forgot password page. Keep note of those. 7. Now to see if the email is correct, go back to the Facebook homepage and click forgot password again. This time paste in the email you think it is. 8. If it's correct you should be taken to the same page to send a recover email, but the email won't be starred out and you'll still see the last 2 digits of their phone # so you can confirm it's correct. [/hide]
  5. [hide] Bin details: https://anonfile.com/Vbfac9h4b8/Napster_txt Temporary Email: https://temp-mail.org/en/ [/hide]
  6. I would recommend running in sandbox because one file was infected with a rootkit. [hide]https://www.mediafire.com/folder/ns2ilt4jmdj1b/Hack_Pack[/hide]
  7. Checker Packs Include: AntiPublic ExpressVPN checker M1st Checkers MinerGate Cracker Mr.Viper Cracker Paypal Checker PSN RubiconT Checker Saavn Cracker STORM v 1.4 Uplay Accounts Checker X-SLAYER Checker ShaOnKristof Checker xPolish Checker [hide]https://mega.nz/#F!zLxVkLYb!E8_8yMCiSUtJXxed9IpPCg[/hide] The above link contains no ads so you don't have to spend the next 5 min completing CAPTCHA.
  8. [hide]Hey folks! SSH or "Secure Shells" can be used in many different ways and they are sold for $ 5.00+ on spammer markets (price always depends on quality). So this might be a nice way to make some money, too. This guide/tutorial is dedicated to beginners - if you are already cracking SSH and other stuff like that, there won't be anything new in it for you. So let's start and see yourself how easy it is! 1. What you need At least get a VPN to secure your internet connection. Install the latest version of VirtualBox which is available for free. Get KALI Linux which is available for free, too, and set up a virtual machine (VM) with it. Alternatively, get the ready-to-start VM-image for VirtualBox from Offensive Security (as usual, it's free). Pointing to c) everything you gotta do is importing the image in VirtualBox after the download. You can start the system right away though I advise you to update the settings (add more RAM and so on). Just give the VM a little bit more ressources for a better performance. 2. Starting with KALI Linux: After starting the VM you need to log in. The standard credentials are: user: root pass: toor You may change those credentials, but it's not necessary for this guide. After login, start the "Terminal" by clicking on the black icon in the dock or just right-click on the desktop and choose "Start terminal". We first have to update the machine to the latest version, so type: apt-get update apt-get upgrade And after the upgrade has been finished reboot the VM. Now your KALI-VM should be up to date and most of the software we gonna use is already installed. But you need to install the SSH package. Therefore, start the terminal again and type: apt-get install ssh KALI will install all needed stuff for you, so just sit back and relax. SSH server won't be enabled afterward, but that's not important for us. After the installation process has finished, please type: apt-get install hydra and apt-get install masscan Both commands should lead to a message saying the latest version is already installed. If yes, go to next step. Otherwise, wait for the installation processes being finished. 3. Scanning for SSH First of all, we gonna need some IP ranges we can scan for SSH IPs for the cracking process. There are a lot of generators available online. Now start the terminal again and type: masscan -p22 0.0.0.0/0 --rate=50 -oL scan.txt "masscan" is a strong IP scanner. The "-p22" tells it which port it has to check - 22 here. Instead of "0.0.0.0/0" enter the IP range you want to scan. "--rate=50" restricts the scanning rate. Without this parameter, "masscan" will most likely crash your internet connection. So "50" is a good value when starting. Choose a higher value from scan to scan for testing which rate is compatible with your internet connection. At least "100" should work without problems - if not, you will recognize it very, very fast ;-) With "-oL scan.txt" we tell "masscan" to create a txt document called "scan" which will contain all SSH IPs once the scan has been finished. You will find this document in your home folder (just click on the folder icon in the dock and you will get there). Depending on the IP range you choose, "masscan" will find some SSH you can crack afterward. But before we can start with that, open the "scan.txt" and delete everything except the IPs which look like "0.0.0.0". After you have prepared the "scan.txt", just got to step 4. 4. Cracking some SSH Use the Texteditor and create a new txt document in your home directory called "combos.txt". We need some login credentials for the cracking process. So paste some (format is user:password) to it and save the file. After you have prepared the combolist, start the terminal (again) and type in the following command: hydra -C combos.txt -M scan.txt -o hits.txt -t 1 -T 25 ssh This one starts THC-Hydra using parameters which should work for almost everyone (it's case-sensitive, so type it in exactly like written above!). Nevertheless, you may speed up the cracking process by changing the values. So here is what the parameters mean: "-C combos.txt" tells THC-Hydra, that it shall use the login credentials in the txt-file "combos.txt". "-M scan.txt" leads to the file "scan.txt" which contains the hosts to check/crack. "-o hits.txt" makes THC-Hydra saving valid logins to the file "hits.txt" which will be placed in your home directory. "-t 1" ensures that THC-Hydra only opens one connection (1 thread) to every IP at once. The "-T 25" makes it using a maximum of 25 connections (threads) at the same time. You can higher the "-t 1" up to "-t 4" though higher values may work, too. "-t 4" is just recommended. The "-T 25" value depends on your internet connection and on the performance of your VM. Most likely, you should be able to higher it up to "-T 50" or just do not enter it and THC-Hydra will set "-T 64" on its own. Finally, the "ssh" tells THC-Hydra what kind of service it is going to crack - so we type "ssh" because ... c'mon, you know why ;-) After starting the cracking process, you will have a lot of time you can spend on waiting. Cracking SSH takes time, so you need to be patient. You can speed up the process by using less combos and by altering the parameters like described above. Nonetheless, you may see some error messages - just ignore them. Not every SSH can be cracked this way, but you should find your first cracked SSH in the "hits.txt" later. 5. Hints for better results: Start the cracking process when your scan.txt contains at least 1,000 IPs. Use a shorter combolist, e.g. only containing combos with "root:...", "admin:..." and "administrator:...". Test varying the parameters for masscan and THC-Hydra to find the best options for your connection and VM settings. Besides that, just check out some IP ranges from Brazil - some of them are golden and will deliver a lot of valid SSH logins. 6. Final words This method works as well if you want to crack FTP, VNC, SMTP, and even RDP. Just change the port when scanning (e.g. from -p22 to -p3389 to scan for RDP) and the "ssh" in the command for starting THC-Hydra (it will need you to adjust the parameters, too). Nonetheless, this is a very easy method and you should be able to crack your first SSH logins within short time. I am still using it though results are varying. But a scan.txt with about 1k IPs should deliver a nice amount of hits for sure. If not, you grabbed a very bad IP range, so scan another one but do not give up :-) Good Luck! And if this thread helped you please rep me up! I would appreciate it! [/hide]