Cracker

Recomandăm folosirea uneltelor de mai jos cu grijă, doar în scopuri educative, de antrenare a capacităților de autoapărare. In niciunfel nu folosiți aceste unelte pentru atac. Hackerul este cel care apără nu cel care atacă. Tocmai de aceea trebuie să cunoască la perfecție armele atacatorilor.

1.Password Cracking Tools:

a) John the ripper-http://www.openwall.com/john/

b) THC hydra-http://www.thc.org/thc-hydra/

c) Brutus-http://www.hoobie.net/brutus/

d) L0PhtCrack-http://www.l0phtcrack.com/

e) SAMInside-http://insidepro.com

f) Cain and abel-http://www.oxid.it/cain.html

g) Pwdump-http://www.foofus.net/fizzgig/pwdump/

2.Pentesting Tools:

a) Metasploit framework- http://www.metasploit.com/

b) Canvas- http://www.immunitysec.com/products-canvas.shtml

3.Sql injector Tools:

a) Sqlihelper

b) Havij

c) SQL Exploiter

4.Website Vulnerability Scanner:

a) Acunetix- http://www.acunetix.com/

b) Rational appscan- http://www.ibm.com/software/awdtools/appscan/

5.Vulnerability Scanner:

a) Nessus-http://www.nessus.org/

b) Retina-http://www.eeye.com/html/Products/Retina/index.html

c) Sara-http://www-arc.com/sara/

6.Port Scanner:

a) Nmap- http://nmap.org/

b) Angry Ip scanner- http://www.angryziber.com/ipscan/

c) Super Scan

7.Intrusion detection Tools:

a) Snort-http://www.snort.org/

b) Sguil-http://sguil.sourceforge.net/

8.Live CDs:

a) Ophcrack- http://ophcrack.sourceforge.net/

b) Backtrack- http://www.backtrack-linux.org/

c) Hiren’s boot cd- http://www.hiren.info/pages/bootcd

d) Ultimate boot cd- http://www.ultimatebootcd.com/

9.Wireless Tools:

a) Wireshark- http://www.wireshark.org/

b) Kismet-http://www.kismetwireless.net/

c) Aircrack- http://www.aircrack-ng.org/

d) Netstumbler- http://www.stumbler.net/

10.Steganography Tools:

a) Steganography Tool –http://sourceforge.net/projects/stegtool/

11.IP Tracing Tools:

a) Neo Trace- http://www.networkingfiles.com/neotrace/

b) Visual Trace-http://www.visualiptrace.com

12.Software Cracking Tools:

a) Debuggers-OllyDbg,WinDbg

b) Unpackers-QUnpack

c) DisAssemblers-WIN32Dasm

d) Decompilers-Boomerang,Mocha,JAD

e) Hex Editors-Hexworkshop,Hview, HxDSetupEN

A list of few „REVERSE ENGINEERING” tools free to Download.

13.Virtual Enviroment Software:

a) Vmware- http://www.vmware.com/

b) Virtual box- http://www.virtualbox.org/

c) Sandboxie- http://www.sandboxie.com/ – See more at: http://www.hax0rtools.com/2013/10/hacking-and-security-tools-for.html#sthash.9351EGA7.dpuf

14.Download Best Free Hacking EBooks In PDF Format :

  1. Hacking into Computer Systems

  2. Hack your Friend using Backtrack

  3. Hacking Secrets Revealed

  4. White Hat Hacking complete guide to XSS Attacks

  5. Reverse Engineering Hacking and Cracking

  6. Windows 8 Hack

  7. Ubuntu Hacks

  8. Mac Hacks

  9. Machine Learning for Hackers Free

  10. Big Book Of Windows Hack

  11. Hack the System for beginners

  12. Reverse Engineering Hacking and Cracking

  13. Cross Site Scripting and Hacking Websites

  14. Hackers By Steven Levy

  15. Ethical Hacking Complete E-book for Beginners

  16. Hacking Website Database and owning systems

  17. Backtrack : Advance Hacking tutorials

  18. Hackers And Painters By Paul Graham

  19. Hacking Wireless Networks for Dummies

  20. Gray Hat Hacking

  21. Hacking And Securing ios Application

  22. Html5 Hacks

  23. Network Security Hacks 2nd Edition

  24. Bsd Hacks

  25. OWASP Hacking Tutorials and Web App Protection

  26. Cyber Attacks

  27. IT Bill (INDIA)

  28. Hacking attacks and Examples Test

  29. Web Hacking & Penetration testing

  30. 501 Website Hacking Secrets

  31. Black Belt Hacking & Complete Hacking

  32. Black Book of Viruses and Hacking

  33. Gray Hat Hacking and Complete Guide to Hacking

  34. Internet Security Technology and Hacking

  35. Reverse Engineering (The Real Hacking)

  36. Maximum Security: A Hacker’s Guide to Protecting Your Internet Site and Network

  37. Hacking For Dummies

  38. Dangerous Google Hacking Database and Attacks

  39. Ethical Hacking and Countermeasures- Web Applications and Data Servers

  40. CEH(Certified Ethical Hackers)2010v6.

  41. CSRF attack & Defense

  42. Hacking : The art of exploitation

  43. Seven Deadliest Network Attack

  44. Backtrack 4 assuring security by penetration testing.

  45. Botnets The Killer Web Applications Hacking

  46. White Hat Hacking complete guide to XSS Attacks

  47. Pass-the-hash attacks: Tools and Mitigation

  48. Black Book of Viruses and Hacking

  49. Hacker’s High School

  50. Ultimate Guide to Social Engineering attacks

GLOSAR

Anonymous – In order to begin pirating, you need to be as anonymous as possible online. Learn more about how to stay safe online here.

Codec – A codec is necessary to play a video format. Download and use VLC Player (it’s free) – I couldn’t play a file with them 3 times in over a decade. If VLC doesn’t have the codec, it’s likely proprietary.

Crack – Software comes with a serial number to unlock it and prove you bought it. A crack is a counterfeit (or stolen/shared) code that can unlock the software.

Deep Web – The deep web is a layer of the internet that’s not accessible through traditional search engines. Rather than depending on web addresses, the Deep Web is accessible through IP addresses and other alternative means. The Deep Web is where you’ll find the evolution of warez.

DRM – Digital Rights Management is anti-piracy security. As piracy evolves, DRM is normally a couple steps behind. These days, the most powerful DRM method involves cloud computing. If you’re going to pirate modern software, it’s vital that you disconnect from the internet prior to installation and program your firewall to block internet connectivity to the program afterward.

Keygen – Short for key generator, a keygen is a program designed to create serial numbers for a variety of software versions. Before running a keygen, ensure your computer is muted – they’re often programmed with intrusively loud music.

Screener – A screener is a DVD-quality copy of a theatrical release, often accompanied by a digital watermark. Screeners are much better quality than Telesync, but are only available to the production staff and critics at major media outlets. Often a screener will come out days to even weeks prior to the theatrical release, allowing critics to have reviews out by opening night and building buzz for the film.

Screeners are most widely available at the end of the year, as award nominations are announced for the SAG and Golden Globe awards.

Proxy – Some sites can’t be accessed from the U.S. Other sites are ONLY available in the U.S. In order to get around such restrictions, you need a proxy server, which routes your web traffic through another node. This makes it appear as though you’re at the geographic location of the proxy, rather than your physical location.

Telesync – A telesync movie is filmed in the theater using a camcorder. This is the lowest quality video and audio, but it’s often the only version available for the first three months after a film’s theatrical release. During this time, various audio and video files are mixed and matched to make the best possible quality and eliminate any syncing issues.

A telesync movie can be identified by TS, CAM, or Telesync in the file name.

Torrent – Torrents are the modern way of pirating, allowing website owners a thin layer of legal protection. Rather than direct downloading of warez, you simply download the torrent. Most torrent sites don’t even directly host the torrents. In the torrent network, the files are hosted on individual hard drives, and you download pieces from each person, never directly downloading a full file from anyone.

Warez – Warez is a general term for pirated software. Before the Gnutella and TOR file-sharing protocols were used, warez sites and forums were the best places to obtain pirated software. Although torrents and streaming are the most efficient methods of software piracy, warez is still used, and the term should be remembered the next time your favorite torrent tracker goes down.