New Post

Rss

Thursday, November 10, 2011
Best Top 5 network scanner hack tools for Hackers

Best Top 5 network scanner hack tools for Hackers

Hello friends, today i will share with you world best  top 5 Network scanning hack tools for windows platform. This article is not only for hackers, it also important for Network administrators. So friends lets explore the world top 5 Network scanning Hack tools selected by Hackingloops. We have rated these on the basis of their features and their performance.
network scanners for hackers, network scanning hack tools
Best Network Scanners by Hackingloops

World top 5 Network scanning tools:

1. NMAP
NMAP is best network scanner till that date, when we take features as our concern, then NMap has left other scanners miles behind. NMap stands for Network mapper and its a free open source hack tool for network scanning and network security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are avalable for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping). 


I will post its video tutorial very soon to explain how to use NMap as hackers.

2. MiTeC Network Scanner
MiTeC is rated as second best network scanner for windows platform and it can be used as its alternative. This network scanner if for both system administrators and ethical hackers who are interested in computer security. It performs ping sweep, scans for opened TCP and UDP ports, resource shares and services.
In addition you have to edit results, save/load results to/from CSV and print network device list. It can also resolve host names and auto-detect your local IP range.


3. SoftPerfect Network Scanner
Hacking loops has rated Softperfect network scanner as third best network scanner by taking its performance and features into account. The interface is very clean and user friendly, but it hides so many great things that it will take minutes until you find them all. The scanning process is pretty intuitive, so the only thing you need to do is to input the range of IPs you wish to scan. Afterwards, you’re able not only to open computers, but also to send messages, initiate a remote showdown operation, send wake-on-LAN signal or start a DHCP or UPnP Device Discovery. SoftPerfect Network Scanner does a great thing when it comes to handling computer resources, so the machine won’t be slowed down even when doing long scans. 


4.  Network DeepScan
 Network DeepScan is a useful and powerful utility that will search for shared NetBios (including system and hidden) and FTP resources over local area networks. This network tool can scan over multiple IP subnets, filter found resources by various criteria, sort it by Host Name, IP Address or Workgroup. You can search for any kinds of files in found resources. Also there is a special feature in this network tool - LAN Explorer. It allows you to browse found shared resources directly in program and not open many instances of Windows Explorer. All important aspects of program configuration are combined under a modern graphical user interface. Find out how easy and effective network browsing can be with the Network DeepScan.


5. Network scanner
Network scanner is an IP scanner for network analysis that will allow you to see all network computers in several seconds. It can scan an unlimited number of IP address ranges or computers from a list. It scans computers not only for NetBIOS resources, but also for running FTP and web services. It is possible to check access right to resources during the scan process. Network scanner works really fast due to multi-thread scanning when every computer is scanned independently. You can change the number of computers scanned simultaneously. Network scanner will help you  export the scan results to html, txt or xml files. 

 
Thanks for reading the article. I hope you all have enjoyed it. If you have any issues ask in form of comments. 
If you like my articles just post a comment to appreciate it.
 
Monday, November 7, 2011
Game Ranger AOE Conquerors 1.0c Hack v5

Game Ranger AOE Conquerors 1.0c Hack v5

Hey friends, At last i am able to compile my new fixed version of AOE 1.0c conquerors Multiplayer hack v5 successfully that works on Game Ranger, i have fixed the bugs that people has told me in the previous version and now it will work perfectly (as previous version hangs and displays error messages) , It consists of all the combo packs of Age of Empires including combo pack 1, combo pack 2, combo pack 3 features(fixed). I have improved lots of cheats in this Age of empire hacks and make it further undetectable during the game. It works 100% on Game ranger and voobly hack is also already just its not compiling and throwing few errors, I am sure you will have this hack working on voobly very soon. This trainer is awesome...just enjoy game hacks and have an extra edge over experts.
AOE hack, Age of Empire Hack, game ranger hacks
Age of Empire Conquerors Hack by Destructive Mind means Lokesh means me
What's new in this version?
1. Update Check is Removed.
2. Hanging of Software is fixed.
3. Warning messages has been removed.
4. All Bugs has been fixed.
5. Activated only for specific player after pressing Q+(key). (please read the Note part).
6. Most tributes are fixed, only tributes for 1000 and 500 resources remains. 
7. Steal resources hacks are fixed, can be used using stale command in hack menu.
8. Combo pack 3 hacks are fixed.
Note: You need to close the hack after each game and then restart again for new game. Else it will be automatically activated for the player which was your color in previous game.


How to use the Hack on AGE OF EMPIRES II Conquerors in Game Ranger:
1. Start the Game ranger. Now Join any AOE II conquerors room.
2. While you are in room Go to the hack folder and start the Hack (Destructive v5) by double clicking on it.
3. Now when the Game starts (means when you in Game and selecting civilizations teams etc). Go back to Hack and click on Enable Hacks and return to game.
4. After game starts, the first thing to do is to select your player number. If you’re green for example, you’re player 3 (if you didn’t change color yourself). So press `(key above the TAB button) to bring up the chat dialog and press and hold Q while pressing 3, after which press `(key above the TAB button) again to activate the hack. Don’t press ENTER – you’d only be letting others know you’re doing something stupid and the hack command won’t work anyway.


Note:  Blah.txt contains all the hacking commands that you will enter into cheat box.
Readme.txt contains the quick Guide to use the cheat commands during the game.

Don't delete any file in the package otherwise some part and features of hack will not work properly.

I hope you all like it.... Enjoy and have fun... If you like it please comment. Give me new suggestions for improvement and i will think and build them.
Hotfile Premium account cookies for 7 November

Hotfile Premium account cookies for 7 November

Hotfile Premium account cookies are alternate way of getting premium account access, using this you will bypass the password authentication to log in into the account and without username password you will be inside the premium account and thus you can download unlimited from these premium websites using this hack.

How to use the premium cookies?
To learn how to use these premium cookies read this post:

Today's Hotfile premium account cookies update 7 November evening are below:
  
premium account , hotfile premium account hack, premium cookies hack
Hotfile premium account cookies hack for 7 November

Premium Hotfile Account Cookie:

d810302bfe4d62d76fdda2dae2328134b69cf89ab4da4dabc237faa28d94d13c



Now how to use premium cookies to get the access to premium accounts. I have already explained how to use premium cookies in my previous post "How to use Premium Cookies for Paid Websites" there i have explained how to use premium account cookies for Hotfile, Fileserve, Filesonic, Rapidshare and megaupload..

I hope you all like my this step of providing premium cookies daily... If you have any queries ask me in form of comments. 
Filesonic Premium account cookies for Nov 7

Filesonic Premium account cookies for Nov 7

Premium account cookies are alternate way of getting premium account access without having the premium account password, thus you can download unlimited from these premium websites using this hack. Today i am giving premium account cookies for Filesonic (5 Premium account cookies tested).

How to use the premium cookies?
To learn how to use these premium cookies read this post:


Today's Filesonic premium account cookies 7 November update is below:
premium account free, premium account cookie hack, premium link generator
Filesonic premium account cookies 7 Nov
  

Premium Filesonic Account Cookie 1:

lc0v9pd77n9l6d4g773pmabf07

Premium Filesonic Account Cookie 2:
0uh38sdicc3q2jn8iati268842

Premium Filesonic Account Cookie 3:

4gfmrguurst4js2b857hqmbr36

Premium Filesonic Account Cookie 4:
c25j5o2bm5vdelelmi5cfkt254

Premium Filesonic Account Cookie 5:
cg243334h17cjqdl8svgp954o3

Now how to use premium cookies to get the access to premium accounts. I have already explained how to use premium cookies in my previous post "How to use Premium Cookies for Paid Websites" there i have explained how to use premium account cookies for Hotfile, Fileserve, Filesonic, Rapidshare and megaupload..
Note: Cookies got expired when they got detected or account has been reverted back to free by Premium account provider companies, so please don't complain if any account don't work.

I hope you all like my this step of providing premium cookies daily... If you have any queries ask me in form of comments. 
Wupload Premium account cookies for 7 Nov

Wupload Premium account cookies for 7 Nov

Premium account cookies are basically premium account passes which allow us to access the premium account and download unlimited without any time limit. Today i am giving premium account cookies for Wupload to download unlimited from Hotfile, Filesonic and Wupload. Hope you all love it...

wupload premium account, free wupload premium accounts, premium cookies
Wupload Premium account cookies for 7 November

How to use the premium cookies?
To learn how to use these premium cookies read this post:


Today's Wupload premium account cookies update 7 Nov evening are below:

Premium Wupload Account Cookie 1:

1foh8vv2mr154vpd8p9mec25b1

Premium Wupload Account Cookie 2:
hr02cus7qehvr7v4vov5fb0oq4

Premium Wupload Account Cookie 3:
0dcso92ui2utk8v2b02d6b3bk1

Premium Wupload Account Cookie 4:
aufmn71i8i3vbfo80iuir0t9g2

Premium Wupload Account Cookie 5:
ui6pahul8ltgoi1q6tr17s8lq7

 Note: Wupload cookies are used in similar manner as Fileserve and Filesonic. You have to edit or add PHPSESSID and add the above cookie into that.

Now how to use premium cookies to get the access to premium accounts. I have already explained how to use premium cookies in my previous post "How to use Premium Cookies for Paid Websites" there i have explained how to use premium account cookies for Hotfile, Fileserve, Filesonic, Rapidshare and megaupload..

I hope you all like my this step of providing premium cookies daily... If you have any queries ask me in form of comments. 
Saturday, November 5, 2011
How Network Scanners work Tutorial by Hackingloops

How Network Scanners work Tutorial by Hackingloops

Hello Friends, lets proceed to topics of our next hacking class of scanning. Today we will learn about how network scanner works. Every network hacking attack requires an IP address and port number of the vulnerable host in order to launch the attack. For example, you have discovered an Apache server exploit which is ready for use, you need the IP address and sometimes the port number( if server is running on custom or non standard port) of the vulnerable host running Apache server. Here the Network scanners will come into picture, network scanners will provide you all of this information, they will not only tell you the IP address and port number of the host but they will also tell you which application is running on which specific port.

Note: This article is for Education Purposes only.

There is lot more things about network scanners, that i cannot explain about them, but i will try to cover as much as i can. So lets start learning more about Network scanners, Suppose you don't have any intention or goal to hack any particular user or network, so just for fun you run  a network scanner against a host or subnet for scanning its details and what you will get is such a critical information that you cannot get by any other means. Nowadays, network scanner also provides you the complete topology of the networks within few seconds.

how network scanners work
Network scanners Working

Most of us only think that scanners are only for determining IP address, port number and application running on specific ports, but my dear friends you will be also get shocked to know that we can also use Network scanner to determine the firewall rules and other access control specific policies like authentication, authorization and privileges escalation etc.

This was the brief about Network scanning and Network scanners. Now let's learn how the scanners actually work.

How Network Scanner Work
Its a big question for new guys in hacking field and i can guarantee that more than 90 percent of existing hackers also doesn't know about how the scanners actually work. What the script kiddie's ( hackers dependent only on hack tools) do they just know how to scan the host, they don't know how it actually works. Most of you have also used the tool NMAP and i know 90 percent of you still don't know how it works. So don't got frustrated if i tell you that if you don't know about how the things actually works, you don't know anything about it. You can never explore things that where else i can use it and other such innovative stuff.

There are lots of network scanners out there in the market and each supports the different set of features and each operates in slightly different way. But all the network scanner follow the same basic principles.
All the networking applications communicate with each other by sending packets(piece of data) back and forth. Scanners use this concept to determine the things, scanners send packets to computers(host) and receives a acknowledgement( packet) from the system. If a response is received, then the host is alive, else host is not active or dead or firewall is blocking the communication. But in case of NMAP, firewall almost never comes into picture as they have inbuilt firewall bypass feature set.
Note: Most of Large companies use a tool called Port Sentry whose only purpose is to frustrate the port scans. Additionally, some feature of firewall like SYN-cookies can make ports appear that they are closed but actually they are open. Cyberoam and Websense and Zone alarm(in expert mode) have this feature.
Most network scanners or we can say most network applications communicate using either the TCP or UDP protocols. Both protocols use the concept of ports to allow for multiple applications to run simultaneously on single IP address. Both UDP and TCP support 65,536 distinct ports, in windows operating system first 1024 ports are reserved for system processing. This in itself a huge topic, i will explain this later. Most applications work on their specific default ports but we can alter it whenever extra security or performance related issues are there. HTTP web servers typically run on TCP port 80, SMTP email servers almost use TCP port 25, DNS servers use UDP port 53 and list is endless. Just go to wikipedia to explore the services and application run on specific ports.

In windows 7, you can easily view which ports is being used by which application or service. Just go to start, in search type " windows firewall with Advanced Security" (without quotes).  Just click to open it, their you will find inbound rules and outbound rules which shows that that which port is currently being used by which application and this also allows you to open and close the specific ports for specific programs.

Network scanners determine what network application is running on a given computer by testing TCP and UDP ports to see whether they are supporting connections. If a TCP port 80 is open on a specific computer that it is assumed that it is running HTTP web server. Now we must know different types of scanning too. There are basically two types of Network scanning, TCP scanning and UDP scanning.
So today i am looking in little good mood, so lets learn that also today.

TCP Scanning
The main goal of TCP scan is to determine which TCP ports have applications listening(using) on them.  For TCP scan, no actual communication with the listening application is needed as TCP scan  allow you to get the information about which ports are open without  completing the full connection. TCP connections use 3 way handshake protocol. To see whether application is listening the specific port, what scanner do is that it send a TCP SYN packet to the port and wait for the response. If the SYN/ACK packet is returned, then it means port is open. If RST packet is returned then it means that the port is closed. 
Most important, if no response is received after some time, then the port is considered as filtered (i.e. some firewall or antivirus program is blocking the connections to the port) or there is no host alive with that IP address.
Now lets learn what is UDP scanning.

UDP Scanning
UDP scanning is little bit tricky and difficult than the TCP scanning. UDP  works on Fire and forget protocol means we just send the packet and nothing is returned back so its quite difficult to find anything without response. Also we cannot determine that host is alive or dead or filtered. However, there is one ICMP concept which actually help the scanners to determine the open or closed ports. If a UDP packet is sent to a port without an application bound to it, the IP stack will return an ICMP port unreachable packet. The scanners assume that if any port has returned ICMP error then its closed, while the ports that didn't answer are either open or filtered by the firewall.

That's all the overall concept that what are network scanners, network scanning and how actually the network scanning works and different types of network scanning.

If you have any issues or queries ask in form of comments.. It take lot of time to write such a detailed tutorials, little appreciation comment can do the work. So don't feel shy to comment.

Designed by Hackingloops.