in73ct0r d3vil On Fire. China Sites Fu*Ked By HSH


China ?
My Ass xD All down by in73ct0r d3vil
[+]Site :
http://verinasieu.com/index.html
http://studiostomsup.com/index.html
http://quebecfoot.cn/index.html
http://notremenu.com/index.html
http://mdbexcavation.com/index.html
http://lilialphoto.com/index.html
http://greenscreenmontreal.com/index.html
http://evenementmode.info/index.html
http://edwigefrancou.com/leet.html
http://www.educationfinance.cn/index.html
http://www.agencevair.com/index.html
http://51gaozhong.com
http://beeparttime.com
http://daxuemedia.com
http://www.929gw.com
http://www.baiduqic.com
http://www.baidu518f.com
http://www.baidu518d.com
http://www.baidu518e.com
http://www.baidu518b.com
http://www.dhqipgw.com
http://www.bdqipaiyx.com
http://www.baidu518yx.com
http://www.amanuo.com
http://www.baidu518g.com
http://www.dhysgw3.com
http://www.baiduhwc.com
http://www.dhysgw1.com
http://www.czyrlzy.com
http://www.xiyingqipa1.com
http://www.xiyingqip1.com
http://www.sestopiu.it/index.html
http://www.motopatrol.fi
http://51gaozhong.com
http://beeparttime.com
http://daxuemedia.com
http://51chengkao.com
http://mybuu.com
http://qingyidao.com
http://bjfuclub.com
http://guangzhou2026.net
http://51part-time.com
http://guangxiaozhu.com
http://nanyaodao.com
http://tuanshui.net
http://jingzhang2022.net
http://sysuhome.com
http://bishengjiao.com
http://xyxjh.com
http://zheyibu.com.cn
http://cnuclub.com
http://huaxuezhi.com
http://51chuzhong.com
http://artskaoyan.com
http://easy-h5.com
http://51wushu.com
http://mysuibe.com
http://huabingke.com


Mirrors[+]: Zone-hc

Team_Hind  AnonFighter

Pakistani Websites Hacked on Kargil Vijay Diwas.

Hacked by in73ct0r d3vil on auspicious day of Kargil vijay divas.

We celebrate the success of #OPVIJAYA

Salute to Indian Soldiers.

Greets: Hell shield hackers | Indian Elite Hackers | IBH | TEAM HIND |Indian Mad Hunters| ICS | ICA | ACA | Cy83r_pirates | All Indian Hackers.

Sites Hacked :
 
http://kpbos.gov.pk
http://goo.gl/8GidYN  = PPP Hacked
http://goo.gl/pqy67n  = Pak Rishta Hacked
http://www.ajtechnologies.pk/
http://gsmaladdin.com/web
http://bandana.pk/contact-us/
http://cityelectronics.pk/web/
http://www.skillscollege.com.pk/web/
http://etrade.pk
http://diplomacollege.pk
http://cmc.net.pk
http://doit.com.pk/
http://islamfinderpk.com
http://wecan.org.pk
http://burewala.com.pk/
 
Mirrors:
 
http://zone-h.org/mirror/id/24634259
http://zone-h.org/mirror/id/24634220
http://zone-h.org/mirror/id/24583622
http://zone-h.org/mirror/id/24529303
http://zone-db.com/mirror_29356.html
http://zone-db.com/mirror_29355.html
http://zone-db.com/mirror_29353.html
http://zone-db.com/mirror_29352.html
http://zone-db.com/mirror_29062.html
http://zone-db.com/mirror_24435.html
http://zone-db.com/mirror_25810.html
 
Expect Me. Pakistan.gov.pk would be hacked soon ......
./Logout
 

 

 


Lahore FM Pakistan Hacked by IndCyberJOker and in73ct0r d3vi

in73ctor d3vil [HSH] And IndCyberJOker [TEAM HIND]



[+]Site: http://lahorifm.com/
[+]Mirror: http://zone-db.com/mirror_31232.html

Porkies Stay Away From Indian Cyberspace.
We Are Indians.
We Are Anonymous.
We Are Legion.
We Do Not Forgive.
We Do Not Forget.
Expect Us!
AnonFighter

Indian Hackers Bring Down Pak Websites On Independence Day.

A group of anonymous Indian hackers, called 'Hell Shield Hackers', claimed on Saturday to have taken down around 100 Pakistani business websites as a "tribute to Indian jawans" on the occasion of Independence Day.
The term black hat refers to the hacking of a website with malicious intent, while white hat refers to ethical hacking. In the hacking terminology, defacing means taking down a website.
The hackers posted a message in all the websites asking Pakistani citizens to "be prepared for a full day of website attacks".   
According to Injector Devil, Pakistan hackers had hacked many Indian sites on Friday (to mark Pakistan’s Independence Day on August 14) and this was payback.
"We want to pass the message that Pakistan hackers should not attack Indian cyber space without any reason. If they do it, we are ready to defend it. Cyber space needs peace but they keep on violating it. But Pakistan hackers were in full blown war on August 14. So it's a little payback from our side as we always do."

Some of the prominent sites that were defaced are:

http://www.nationalclubpk.com/rooms  
http://www.skillscollege.com.pk/Vijay.html
http://www.paspk.org/root.html
http://www.online-akhbar.com
http://cityelectronics.pk/web/

The entire list of 'hacked' websites was published in Pastebin, a cloud space for storing text information.
 
http://pastebin.com/wiatQW5P

While some of the hacked websites have recovered, the others remain defaced.
 
Posted By AnonFighter

Sites Defaced By IMH On Independence Day .

Pak Paypal Checker Site Defaced By Cyba Tiger [IEH] [TEAM HIND]

Pak Porkies Never Mess Up With Us.
We Are Indians.
We Are Fear Less.

Site Link:.
http://www.accppakistan.com/






Article Posted By AnonFighter

Site Defaced On Independence Day.[HSH]

Happy Independence Day To All Of You.

 

 

On This Special Occasion Some Sites Defaced By  In73ct0r d3vil From Hell Shield Hackers.
We Are Indians,
We Are Anonymous,
We Are Legion,
We Do Not Forgive,
We Do Not Forget,
Expect Us!

Defaced Sites:. 


We Are HSH TEAM HIND, Indian Elite Hackers, And All Indian Hackers.

Article Posted By AnonFighter

Sites Recovered On 14 Aug.

 

Sites Recovered  By TEAM HIND 

Happy Independence Day In Advance. 

Hey Pak Porkies Never Mess Up With Us....

We Are Offline Not Dead...

Feel The Power Of Indians....

You Can Hack Only Our Non Technical Sites.......


Simple WEP Cracking

 

1 Introduction

This tutorial will show you how to crack a depreciated, but still used, wireless encryption algorithm called Wired Equivalent Privacy (WEP). WEP was introduced in 1997 and was designed to provide the user with a secure connection comparable to that of traditional wired networks. But sometime in 2001 weaknesses where beginning to show and in 2004 WEP was declared depreciated due to the fact that it was unable to meet its security goals.

2 Implementation

This tutorial is written for users of Linux, you may be able to follow along using Microsoft Windows, make sure to check the aircrack-ng website. (http://www.aircrack-ng)

This tutorial is written with the then current version of aircrack, 1.0. Download and compile the aircrack tools or use you download manager, search aircrack-ng, it should be easy to do. Once that is done check it is working by typing “aircrack-ng” you should have a output that looks something like this:
 

osaka@Nyu:~$ aircrack-ng
Aircrack-ng 1.0 rc3 – (C) 2006, 2007, 2008, 2009 Thomas d’Otreppe
Original work: Christophe Devine
http://www.aircrack-ng.org
etc ..

There will be four scripts from aircrack-ng that you will be using:

airmon-ng <start|stop|check> <interface> [channel or frequency]
Script used for switching the wireless network card to monitor mode

airodump-ng <options> <interface>[,<interface>,...]
Script used for WLAN monitoring and capturing network packets

aireplay-ng <options> <replay interface>
Script used to generate additional traffic on the wireless network

aircrack-ng [options <.cap /.ivs file(s)>
Script used to recover the WEP key, or launch a dictionary attack on WPA-PSK using the captured data.

You will need to know some basic Linux networking commands.

iwconfig [-v] [-a] [-s] [interface]
This is a standard Linux command it will display the status of the currently active interfaces. If a single interface is given it will display only that interfaces status.

-v Be more verbose for some error conditions
-a Displays all interfaces which are currently available, even if down
-s Displays a short list (like netstat -i)

2.1 Action

To start, we need to reconfigure the network interface to promiscuous mode, or more commonly known as monitoring mode. Some interfaces do not support this mode, google your card and find this out. This could be a problem if you are having trouble, make sure your card has this feature. To start your interface in monitor mode simply type:
airmon-ng start <interface>
If it worked it will create an alias to your specified interface, we will be using wlan0. To make sure if this has worked you should run the ifconfig command. If it did work then you will see mon0 in the list of interfaces.

Now that your interface is set up correctly, we can move on to the next step this is to locate a crackable network. Run the following script and you will have a display of the networks in your area in real-time.

airodump-ng mon0
The data being displayed is information about wireless networks in your area, some of the information displayed is - Basic Service Set Identifier (BSSID) – which is the Media Access Control (MAC) address of the wireless access point (WAP), network channel etc. We need to know what kind of encryption the network is using, as this is an article on cracking WEP, we should look for any network with the WEP encryption.

Once you find a network with WEP encryption we need to collect the data packets that are on the network to do this run the following command:

airodump-ng -c <channel> --bssid <BSSID> -w <output-file> mon0
airodump-ng -c 6 --bssid 00:0F:CC:7D:5A:74 -w dataFile mon0

This will capture the data being transmitted over a network using out interface mon0 on channel six from the wireless access point with the BSSID of 00:0F:CC:7D:5A:74 and write it to a file called data.

-c Network channel
--bssid Basic Service Set Identifier MAC Adderess
-w Write captured packets to file “dataFile”
mon0 Is the alias to the wlan0 in monitor mode

We will need to collect about 10,000 data packets before we will be able to crack the encryption. It will take anywhere from 5 – 30min to get enough packets, this depends on how much the network is being used. If it has a lot of traffic then more packets will be sent out.

Now if it late at night or there is not a lot of traffic, then we can use the following command to make the wireless access point transmit some packets:

aireplay-ng -3 -b 00:0F:CC:7D:5A:74 -h 00:14:A5:2F:A7:DE -x 50 wlan0
-3 This specifies the type of attack, in our case ARP-request replay
-b MAC address of access point
-h MAC address of associated client from airodump
-x 50 Limit to sending 50 packets per second
wlan0 Our wireless network interface

Again this could cause problems if your interface dose not support injection. Give google another shout.

Once you have 10,000 – 20,000 data packets you are ready to give cracking it a shot. Now you should have a few files created in your current directory from the previous script, these are the files which contain the data packets that you collected, run the following script to get the WEP Encryption Key.

aircrack-ng dataFile*.cap
It will take its time and you will see some really cool data displayed on your screen, then once its complete it will give you the key in plain text.

3 Conclusion

So as we can see within 10min of good data transmission we are able to gather enough data packets to be able to crack the encryption. To crack WPA and WPA2 the method is more or less the same, but with a slight difference and more time is required. Despite the fact that WEP is a depreciated algorithm it is still used in homes and other places across the world today.
Remember this is for educational purposes and I hold no responsibility for your actions.

Article Posted By AnonFght3r

 

 

Creating Your Own hidden .onion Darknet Domain [Windows]

 

Sometimes when you need a website which isn’t public and you wish to share it with a select few. At such times you can easily get an URL with a .onion TLD. With your computer as the server you are assured that your files hosted on the site are safe on your own computer and are being shared with the right people.
First of all, you will need to install the TOR(The Onion Router) browser. This is a special browser that focuses on anonymity of the user. All the sites you visit using it are routed via a proxy server, thus, it doesn’t let the site know your real identity. Websites using .onion as TLD are only accessible via the TOR browser or through certain websites like tor2web.org.

In case you want your site to be accessible via normal browsers then you need to append ‘.to’ at the end of an .onion URL. This isn’t recommended because there is a chance that your site may fail to load.

Now let's start by installing a Web Server on our computer. You can use XAMPP and other popular web server packages but you risk disclosing your actual IP, hence, it is advised to use ‘Savant’.

Setting up the server

Start Savant and click on the ‘Configuration’ tab and a pop-up should appear. In the ‘Server DNS Entry’ option, type ‘localhost’ and in ‘Port # To Server From’ type ‘8080’. If this doesn’t work then try port 80 or any other open port for your system. After clicking ‘apply’ open any browser and visit ‘localhost:port’, replace port with ‘8080’ or with whichever you went with. If the page loads then you’ve got it right, if not then re-check all the steps. The page that just loaded was from your own PC only and that too from “C:\Savant\Root” directory. As a general rule ‘index.html’ will be acting as your default/first-loading page.

Note: Savant is very unstable so you can use ‘uniformserver’ as well 

Obtaining your URL

Now almost everything is done, we just need to tell TOR about our server and then it will provide us our URL. Before we begin you need to create a folder on your desktop which will be used by TOR to provide you the URL of your site. Close your TOR browser if it is open and then go to your TOR installation directory, look for a folder labelled ‘Data’, in it open the ‘Tor’ folder and look for a file named ‘torrc’. Open it in any text editor program and enter the following lines in it.

HiddenServiceDir C:\Users\YOUR_USERNAME\Desktop\NAME_OF_FOLDER HiddenServicePort 80 127.0.0.1:YOUR_PORT

in the above two lines make sure to edit ‘your_username’ with your computer’s username and ‘name_of_folder’ with the name of empty folder that you just created on your desktop. Also make sure to replace the word ‘your_port’, with the port that you entered in Savant.

Now you need to save this file and then open TOR browser, so that TOR can generate a URL and Private Key for your website. Wait for 5-6 seconds and then close TOR browser.

Now navigate to the folder that you’d created on your desktop and you will find two files in it – Hostname and private_key. You don’t have to do anything with private_key, it’s there for identification purposes.

Open the file Hostname with any text editor and you’ll find the URL of your website with .onion as TLD. For me the URL was
utfd24oh7n43kxj2.onion and to visit the website you need to append ‘/index.html’ after .onion so the URL becomes

http://utfd24oh7n43kxj2.onion/index.html

Don’t delete the folder that you’ve created on your desktop. Running an anonymous site is not an easy task and it’s possible that the authorities may crack down on you if you engage in any illegal activity. 

Article Posted By AnonFighter