So, lets talk about one the most famous hacking tool i.e Sub 7.
Well most of you wont be knowing that sub7 is Shutted Down due to its over usage and its mainly usage for Illegal Work.
Sub7, or SubSeven or Sub7Server, is the name of a popular backdoor program.
It is often used for causing mischief, such as hiding the computer cursor, changing
system settings or loading up pornographic websites. However, it can also be used for more serious criminal applications, such as stealing passwords and credit card details. Its name was derived by spelling NetBus backwards ("suBteN") and swapping "ten" with "seven". 

Files


1. SubSeven.exe - is the file you open and use to control your server (VICTIM)
2. Server.exe - is the file you send to your victim to control him
3. EditServer.exe - is the file you will use to configure the server you chose to use (edit the server)
4. ICQMAPI.DLL - is not necessary to know about but it lets you use the ICQ functions with the client/server.

Screen Shots


Sub7-2.15



sub7_2


sub7editserver 

History


It was originally designed by someone with the handle 'mobman', whose whereabouts are currently unknown. No development has occurred in several years and the website was updated recently announcing a new version coming soon by mobman.

Since then Sub7 remained dormant for over 6 years until its return in July 2009, marking 10 years after its original creation in 1999.

In July 2009 mobman posted on www.subseven.org which appears to be the official site, that SubSeven has entered another life cycle stage and further development on the project is in the works. The site also announced 2.3 could be the next release, but gives no release date. An IRC server is also given irc.subseven.org which appears to have some of the older crew members from the Sub7Crew back from 1999.

Among Sub7's capabilities are complete file system access and real-time keystroke logging. The latter capability makes it possible for Sub7 to be used to steal passwords and credit card information. It also installs itself into the WIN.INI file and the "run" key of the Windows Registry, in addition to adding a "runner" to the Windows Shell.

*Source Wikipedia 

Download





Steps :-

How to properly configure a server using Edit Server :

1. Click "browse" and find the server.exe file you are going to edit
   (named server.exe in the local directory) then click "Read Current
   Settings"

2. StartUp Methods: you basically check one or MORE boxes to choose
   how the server will restart itself everytime the computer is booted.
   key name: the registry key name that will go with the startup method

3. Notification Options: Victim Name: the name of your server that
    you want to come up in your ICQ notify, Enable ICQ notify to UIN: is
    the ICQ number you want the notify to go to, Enable IRC notify: will
    send a bot to the IRC server you specify and will notify you of the
    IP, port, password etc. Email notify seldom works, so lets not bover
    with it here..

Installation:


a.  Check the box and set the port number you want the
     server to start on in the victim's pc, if you want a random port,
     then you click the checkbox underneath that.

b. You can set a server
    password
 which will protect your victim from others who try to connection.

cYou can protect the server port and password, d)and enable a bot
    that logs on whenever your vic connects to the internet.
e.  You can choose your server name that you want the server that's installed in
     your Windows directory to be named.
f.  Choose to melt the server after
    the install(deletes server after its double clicked but still installs
    into windows directory
g. Configure an Error message to be displayed
    when the server is clicked so as to lead the victim away from thinking
    its a virus ;)
hHint: Avoid Using this Binder, use an external one
    instead :) i would recommend Stan's Oblivion Joiner at
    [ 
http://www.oblivionrat.com ] or Blades "The Joiner".

4. Protect server: you can set a password so that if your server is
    found, the person cannot get it into the edit server to find out the

    embedded info inside it

5. Now you can either save the settings to the server you opened,
    overwriting the old settings, or you can save a new server with the
    settings you just provided, still retaining the old server as well.

6. You can also change the server icon by clicking the button in the
     top right corner :)

Features

New Feature: under "Local Options - Advanced" section of the
client theres a button "Test on Local Machine" which runs the server
with special restrictions (accepts localhost connections only)

1) Connection:
   A) IP Scanner - Scans for IPs with an open port you specify
   B) Get PC Info - All PC info, including Disk Size, Space, User etc
   C) Get Home Info - Gets all Home Info the vic specifies for their
      Windows Registration ( not always availible)
   D) Server Options - Options pertaining to removing, changing port,
      updating server, etc.
   E) IP Notify - Adds a new notify method or changes the current
      method on the current server

2) Keys/Messages:
   A) Keyboard - Open Keylogger, get offline keys, disable keyb. etc
   B) Chat - Chat with the Victim
   C) Matrix - Chat with the vic matrix style (black & green design)
   D) Message Manager - Sends a popup message to the vic
   E) Spy - ICQ, AIM, MSN, YAHOO Instant Messenger Spies
   F) ICQ Takeover - displays all installed UINs on the pc, and u can
      take each one over at the click of a button

3) Advanced:
   A) FTP/HTTP - turns the vic into an FTP server, ready for files to
      be downloaded via ur FTP client or browser
   B) Find Files - searches for a specified file type or file in the
      vics pc
   C) Passwords - retrieves Cached, Recorded, RAS, and ICQ/AIM Passes
   D) RegEdit - Opens the vics Registry so u can fuck with it >:)
   E) App Redirect - Lets you run a DOS command on the vic and shows
      you the output
   F) Port Redirect - adds an open port to the vic so you can "bounce"
      from it using the vics host as your own, E.G.: proxy type of
      contraption via IRC

4) Miscellaneous:
   A) File Manager - Upload, Download, Run, and do alotta other cool
      shit via this client
   B) Windows Manager - Displays open windows which you can close,
      disable, etc.
   C) Process Manager - Shows all processes you can kill, disable,
      prioritize etc.
   D) Text-2-Speech - Messes with the Text2Speech engine on the vics
      pc, you type, it talks
   E) Clipboard Manager - View, change, empty the vics clipboard
   F) IRC Bot - Connects an IRC bot from the vic to an IRC server of
      choice

5) Fun Manager:
   A) Desktop/Webcam - Views Webcam continuous capture, a desktop
      continuous preview and full screen capture
   B) Flip Screen - Flips victims screen upside down, and sideways
   C) Print - Prints on victims screen
   D) Browser - Opens victims browser with the webpage you specify
   E) Resolution - Changes victims pc resolution
   F) Win Colors - Changes the victims computer colors

6) Extra Fun:
   A) Screen Saver - Changes the Vics Screensaver
   B) Restart Win - Shuts down, reboots, or logs off the victim
   C) Mouse - Set Mouse trails, reverse buttons, hide curson etc
   D) Sound - Record from vics mic, change volume settings
   E) Time/Date - Changes system time
   F) Extra - A whole buncha extra shit like hide desktop, hide start
      button, hide taskbar, open cd-rom etc.

7) Local Options:
   A) Quality - Adjusts the quality of the Webcam/Desktop
   B) Local Folder - Changes the Sub7 Local Folder
   C) Skins - Skin manager for Sub7
   D) Misc Options - Misc shit like toggling animation of windows etc
   E) Advanced - Messes with ports used for some Sub7 Functions Dont
      bother messing around
   F) Run EditServer - Hmm..i wonder what this does...

The END

HACK FACEBOOK ACCOUNT
Hasifnoor-JAiHA groups_Attasheri

 How to hack Facebook
In this post I will tell you the Top 3 Methods Which hackers use to Hack Facebook passwords and some counter measures also to help you protect your Facebook account from Hackers. In my previous posts I have mentioned lots of techniques to Hack a Facebook Password but In this article I will highlight the most effective ones.e
A lot of people contact me about suspecting their boyfriend/girlfriend of cheating, but they are on Facebook and ask why I haven’t written a guide for hacking Facebook passwords

The following are the methods used by most Hackers to Hack a Facebook Password
  • Keyloggers
  • Mobile Phone Spying
  • Phishing
Keyloggers(Spying Softwares)
Well keylogging is the widest and most commonly used Technique to Hack a Facebook Password. A keylogger is a piece of software used to record keystrokes( Keys that were typed) on a computer.Keyloggers support two types of monitoring depending upon their efficiency and quality

1. Local Monitoring 
2. Remote Monitoring

Local Monitoring keyloggers are used to monitor a personal computer. where as Remote Monitoring keyloggers are used to monitor both local pc's as well as remote pc's.
With my experience of over 4 years in the field of Ethical Hacking and security I have tested 50+ keyloggers and spy softwares and have found these two the best:
1. Sniperspy
2. Winspy

If you are confused to choose the right keylogger read my article on which spyware keyloggers software to Choose?

Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
The most popular Mobile Phone Spying softwares are:
1. Mobile Spy 
2. Spy Phone Gold 

If you are confused to choose a Mobile Phone Spying software then Read my Article on Which Cell Phone Spy Software to Choose?

Phishing or Fake Login Pages
Studies show that over 70% of the internet accounts get hacked with this method how ever Making a Fake login pages demands the skill of PHP Coding and HTML too. In Phishing a hacker creates a Fake login page which exactly resembles to the Facebook Page and then makes the victim login through that page and thus the victim gets his/her Facebook account Hacked. To Learn more about Facebook Phishing refer my post How to hack Facebook Password

If you have any questions regarding this article feel free to comment!

Hack/View Webcams around the world [for free]

Copy/Paste any ONE of these search strings into google and it will produce live security/webcams. Most are controllable/zoom etc. Just go to www.google.com and key in the below:-
pssst: some are very interesting webcams

inurl:ViewerFrame?Mode=Refreshinurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210″
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1″ intext:”Open Menu”
intext:”MOBOTIX M10″ intext:”Open Menu”
intext:”MOBOTIX D10″ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
intitle:”sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”
FOR MORE WAIT FOR ADDING OF SOME NEW PAGES

How to Become a Hacker


Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a similar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”. In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.

What Skills do I Need to Become a Hacker?

In simple words, there is no magic to become a  Hacker. But, like anything else that is worthwhile, it takes dedication and willingness to learn. It is most important to have a basic knowledge of the topics such as operating system basics and it’s working, computer networks, computer security and of course programming. However, you need not be the expert in each or any of those topics mentioned. As you gain the basic knowledge of various branches of computer, you can choose any one as your favorite and advance in it.

What is the Best Way to Become a Hacker?

As said earlier, the best way to become a hacker is to start from the basics. You will have to master the basics to build a strong foundation. And once this is done, you’ll be in a position to explore new ideas and start thinking like a Hacker.
There exists tons of books on the market that will teach you hacking, but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in those books. Also, most of them are not suitable for the beginners who doesn’t know anything about hacking.
Anyhow, I have found an excellent Book for the Beginners that will teach you hacking from the basics. This book is the first step to fulfil your dream of becoming a hacker. When I first read this book, I myself was surprised at how simple and easy it was laid out. I decided to introduce this book for all those enthusiasts as it can be the right source for the beginners who are interested to learn hacking from the basics. The good thing about this book is that, any one can understand the concepts presented here, without the need for any prior knowledge. This book is called:
Hacker's Underground Handbook
Learn Hacking
This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything in this book is presented in a simple and effective manner. It is a great source for the beginner who would like to become a hacker. This will install a Hacker’s Mindset on you.
The following skills are uncovered in this book:
You will learn all the hacker underground tricks and learn to apply them in real world situations.
  1. You will be put into a hacker mindset so that you will learn to think like a Hacker.
  2. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
  3. You will acquire knowledge nonexistent to 99.9% of the people in the world!
  4. This underground handbook may get you interested in pursuing a career as an Ethical Hacker.
  5. This book is of great value for all those who have a dream to become a Hacker.
So what are you waiting for? Go grab your copy now from the following link:

Wait… This is not the end. Rather it is just the beginning of your journey. To become a hacker, all you need is dedication and hard work. I wish you all the best for your future success.

How to Become a Hacker


Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a similar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”. In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.

What Skills do I Need to Become a Hacker?

In simple words, there is no magic to become a  Hacker. But, like anything else that is worthwhile, it takes dedication and willingness to learn. It is most important to have a basic knowledge of the topics such as operating system basics and it’s working, computer networks, computer security and of course programming. However, you need not be the expert in each or any of those topics mentioned. As you gain the basic knowledge of various branches of computer, you can choose any one as your favorite and advance in it.

What is the Best Way to Become a Hacker?

As said earlier, the best way to become a hacker is to start from the basics. You will have to master the basics to build a strong foundation. And once this is done, you’ll be in a position to explore new ideas and start thinking like a Hacker.
There exists tons of books on the market that will teach you hacking, but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in those books. Also, most of them are not suitable for the beginners who doesn’t know anything about hacking.
Anyhow, I have found an excellent Book for the Beginners that will teach you hacking from the basics. This book is the first step to fulfil your dream of becoming a hacker. When I first read this book, I myself was surprised at how simple and easy it was laid out. I decided to introduce this book for all those enthusiasts as it can be the right source for the beginners who are interested to learn hacking from the basics. The good thing about this book is that, any one can understand the concepts presented here, without the need for any prior knowledge. This book is called:
Hacker's Underground Handbook
Learn Hacking
This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything in this book is presented in a simple and effective manner. It is a great source for the beginner who would like to become a hacker. This will install a Hacker’s Mindset on you.
The following skills are uncovered in this book:
You will learn all the hacker underground tricks and learn to apply them in real world situations.
  1. You will be put into a hacker mindset so that you will learn to think like a Hacker.
  2. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
  3. You will acquire knowledge nonexistent to 99.9% of the people in the world!
  4. This underground handbook may get you interested in pursuing a career as an Ethical Hacker.
  5. This book is of great value for all those who have a dream to become a Hacker.
So what are you waiting for? Go grab your copy now from the following link:

Wait… This is not the end. Rather it is just the beginning of your journey. To become a hacker, all you need is dedication and hard work. I wish you all the best for your future success.
Previous PostOlder Posts Home