New Post


Monday, October 28, 2013
Hacking Hackers Phish Pages to View Hacked Facebook and Email accounts using Google

Hacking Hackers Phish Pages to View Hacked Facebook and Email accounts using Google

Welcome friends, today i am going to teach you how to see the hackers illegal phish pages password file using Google, which all the passwords of victims are stored. As we all know 99 % hackers over internet are novice hackers or simply script kiddies. They don't know the concepts and they just follow or use the material available on internet to create Phishers to Hack Facebook, Gmail or simply passwords. Which always result in creating Phisher successfully but not a secure one because none tells the after phisher technique like how to make phishers undetectable, how to protect password files where all hacked passwords are stored etc. As most of us know that Phishing is the easiest method over internet to hack Facebook and Email account passwords, so most novice hackers opt this option to hack victims passwords. In fact some professional hackers uses Phishing technique too but they are bit advanced and prefer tabnabbing(click here to learn more) over Phishing. As Hackingloops concentrates on concepts and digging the root causes. We will learn something better that no body does or tells. What loophole we are digging today?? Any idea?? No ?? So go on.

Hacking Hackers Phish Pages to View Hacked Facebook and Email accounts using Google
Hacking Hackers Phish Pages to View Hacked Facebook and Email accounts using Google


Most of us who are webmasters i.e. people who design websites knows the concept of Google indexing but others might not have that good idea. So let me explain first. How any website results appears in Google search results? You made the website and how does Google knows you website? All search engines uses spider and crawler software's over the web to index the new websites or latest changes in the existing websites in order to give users the best latest results. And indexing of website depends on a file located at root level of all web hosting websites, if its not present Google treats as full index. Most people think that robots.txt file is used to tell Google to index your website but actually robots.txt file used to tell Google that what you want to index from your website and what you don't want. By default, robot file allow full website indexing i.e. all files are indexed even password and database files. Woooo! Here the loophole lies. Most almost all hackers uses free web hosting websites to run the Phish pages and all free web hosting websites have default robot.txt file which means when hacker uploads its phish pages, its indexed by Google. And we all know what we use to extract smart information from Google? Off course its Google Dorks. Now we have to learn how to make our own dorks to extract hackers phish page information.

Hackers edits Form redirects of any login page and change the request mode from POST to GET in order to retrieve passwords in plain text and then they stores it in simple text and html files. Today we are going to learn how to extract those password files using Google. Well there is not much to learn in it because i have already made the DORK for you, what you have to do is just enter the same in Google and you will have access to all Hackers Phish pages password files containing all the hacked password they hacked till now. 

Learn how to make Phish page online in less than two minutes:

Dork to extract all Hackers Phish Pages Password file :

inurl:"passes" OR inurl:"pass" OR inurl:"passwords" OR inurl:"credentials" -search -download -techsupt -git -games -gz -bypass -exe filetype:txt OR @gmail OR @hotmail OR @rediff
Just open the Google search and enter the above dork into it, you will get all Phish page password files. 

If you want to learn how to Search Google like Professional Hacker then its a must read:

Hope you all like the noobie way to view all the hacked passwords. There are several other ways to hack the hackers in smart way. We will learn that in future tutorials.

Learn 4 different ways that hacker uses to hack Facebook accounts:
Enjoy Happy Hacking ! Have Fun!

Sunday, October 13, 2013
DNSMAP Tutorial | DNS Network Mapper Information Gathering | KYB Tutorial 3

DNSMAP Tutorial | DNS Network Mapper Information Gathering | KYB Tutorial 3

Hey friends, Hackingloops is back with another Know Your Backtrack Tutorial. In this tutorial we will be learning DNSMAP Tool for DNS information gathering. DNSMAP as the name suggest is DNS Network Mapper which is used for multiple purposes. Basically DNSMAP is an passive Network Mapper and often called as Sub domain brute force tool. This tool is mainly used by penetration testers and Hackers for DNS and sub domain information gathering. This is like most other DNS information gathering tools except one unique feature and that itself a worth to appreciate. Unlike other tools, where we use brute force technology to gather all sub domains we don't have a feature to abort the brute forcing if domain uses wildcards technically you can say it producing false positives while enumerating sub domain data. So friends lets first discuss the key features of DNSMAP and what all we can gather using it.

DNSMAP Tool Backtrack Tutorial
DNSMAP Tutorial KYB 3 Hackingloops

Key features of DNSMAP Tool on Backtrack:

  • Obtain all A records (i.e. IP addresses) associated to each successfully brute forced sub domain, rather than just one IP address per sub domain.
  • Abort the brute forcing process in case the target domain uses wildcards.
  • Ability to be able to run the tool without providing a word list by using a built-in list of keywords.
  • Brute forcing by using a user-supplied word list (as opposed to the built-in word list).
  • Saving the results in human-readable and CSV format for easy processing.
  • Improved built-in subdomains wordlist.
  • New bash script ( included which allows running Dnsmap against a list of domains from a user-supplied file. i.e.: brute forcing several domains in a bulk fashion.
  • Bypassing of signature-based Dnsmap detection by generating a proper pseudo-random sub domain when checking for wildcards (Unique Feature).

Why to use DNSMAP Tool ?

1. Finding interesting remote access servers.

2. Finding badly configured and/or unpatched servers.

3. Finding new domain names which will allow you to map non-obvious/hard-to-find net blocks.

4. Sometimes you find that some brute forced sub domains resolve to internal IP addresses (RFC 1918). This is great as sometimes they are real up-to-date “A” records which means that it *is* possible to enumerate internal servers of a target organization from the Internet by only using standard DNS resolving (as opposed to zone transfers for instance).

5. Discover embedded devices configured using Dynamic DNS services.

How to use DNSMAP tool on Backtrack Linux ?

Step 1 : Open the DNSMAP Tool on Backtrack
There are multiple ways to open the DNSMAP tool over the Backtrack:
a. Using GUI Menu:  Go to Menu Bar and Click on Applications --> Backtrack --> Information Gathering --> Network Analysis --> DNS Analysis --> DNSMAP

b. Using Terminal : Run the below command in terminal

cd /pentest/enumeration/dns/dnsmap/ 
Step 2 : Select the Target and Start the Scan
Say we want to gather information regarding Google. Then in order to run the DNSMAP we have to run below command @ DNSMAP:

When you press enter button you will see the results like below :

DNSMAP Tutorial Image 1
DNSMAP Tutorial  - 1

DNSMAP Tutorial Image 2
DNSMAP Tutorial - 2

DNSMAP Tutorial Image 3
DNSMAP Tutorial - 3

As you all can see above that DNSMAP has scanned all the sub domains of Google along with all A records i.e. IP address of Google sub domains.

Now the above was a simplest way of using DNSMAP. In order to perform more deep search there are several Advanced options available in DNSMAP tool which are listed below :

-w <wordlist-file>
Input file to use for brute force

-r <regular-results-file>
Export results as text format

-c <csv-results-file>
Save files as csv format

-d <delay-millisecs>
Maximum delay (in ms) between 2 DNS lookups(default: 10 ms)

-i <ips-to-ignore>
Useful if you're obtaining false positives

Examples for using advanced options :

If you have a custom wordlist of subdomains you can use that as well simply by specifying the -w argument and then the path to the wordlist.
./dnsmap -w yourwordlist.txt -r /tmp/domainbf_results.txt

./dnsmap -r /tmp/ -d 3000

./dnsmap -r ./subdomainbruteforce_results.txt

That's all friends. If you have any queries ask us in form of comments. Feel free to contact us and Happy Learning. 

Saturday, October 12, 2013
How to Install Nessus on Backtrack 5 - Enable Nessus on Backtrack

How to Install Nessus on Backtrack 5 - Enable Nessus on Backtrack

Nessus 4.4.1 now comes pre-installed on BackTrack 5 and requires that the user activate the installation. Before you activate Nessus on your BackTrack 5 installation, be certain you have installed Nessus either to the hard drive on the computer you plan to use or inside of a virtual machine that you plan to keep on the same host system. If you activate Nessus on a bootable USB thumb drive, DVD or a virtual machine and move it to a new host system, the Nessus activation code will no longer be valid. The Nessus activation ties itself to the physical system on which it is installed. If you do decide to move the virtual machine to a new system, or jump around to different systems using a bootable USB thumb drive or DVD, you will have to re-activate Nessus. If you are using a Nessus ProfessionalFeed, you are allowed to reset your activation by clearing the current connection between a host and an activation code. By logging into the Tenable Customer Support Portal and going to "Activation Codes", you can reset the activation code-to-host pairing. ProfessionalFeed users are currently limited to one reset every 30 days. HomeFeed users will need to re-register Nessus when moving between physical hosts.

Install and activate Nessus on Backtrack 5r3
Install and activate Nessus on Backtrack 5r3

Step 1 - Obtaining An Activation Code

Once you have Nessus installed on BackTrack 5, you will need to obtain a Nessus activation code.  If you are using Nessus at home or wish to evaluate Nessus, you can register a HomeFeed. It’s important to note that the HomeFeed is limited to 16 IP addresses per scan (whereas the ProfessionalFeed allows you to scan an unlimited number of IP addresses). The ProfessionalFeed also gives you access to features such as Configuration and Sensitive Data Auditing, SCADA plugins, Nessus Technical Support and access to the Tenable Customer Portal.

Step 2 - Activating Nessus

Be certain that your BackTrack 5 installation has access to the Internet and activate Nessus using your newly obtained activation code as follows:

Activating Nessus
Activating Nessus

As shown above, this will also initially download the appropriate plugins based on which feed you've chosen.

Step 3 - Creating A User Account

Now you will create the initial user account that will be used to login to the Nessus Web Interface:

Add user in nessus
Adding User in Nessus

After you've entered a username, the nessus-adduser program asks you if the user account should have admin privileges or not. It is recommended that the initial user account have admin privileges so you can use the Nessus Web Interface to create subsequent accounts. The only difference between a Nessus admin user and a regular user is the ability to create user accounts.

Step 4 - Starting Nessus

Using the supplied startup script, start the Nessus server:

Starting Nessus on Backtrack
Starting Nessus on Backtrack
Step 5 - Accessing the Nessus Web Interface

Once Nessus has been initially started, it will begin to index and compile all of the plugins. This can take some time, depending on the speed of your system. If Nessus is still processing plugins, you may see the following screen when accessing the web interface:

Initializing Nessus
Initializing Nessus

The web interface can be accessed with your browser by making an HTTPS connection to TCP port 8834 (e.g. https://localhost:8834/). If you are using a browser local to the BackTrack 5 distribution, such as the supplied version of Firefox, be certain that you enable Flash and JavaScript for this site (Flash is required to access the Nessus Web Interface, and JavaScript is required to view some of the reports). You can also access the Nessus Web Interface remotely by using the IP address assigned to BackTrack 5 (e.g.

That's all friends, now enjoy Nessus over Backtrack.


How to Install Flash Player v11 on Backtrack Linux 5r3

How to Install Flash Player v11 on Backtrack Linux 5r3

Backtrack Linux is one of the most used Operating System by Hackers and some of very important Hacking tools on Backtrack requires Flash player to run example Nessus etc.. Flash player usually works correctly over 32 bit Linux but there are lot of issues while installing Flash player on 64 bit. We all know that recently all processors support 64 bit operating system reason is simple efficient processing, higher ram support and long ALU's and much more. Today i am teach you how to install Flash Player v11.x.x on Backtrack Linux 5r3 or any 64 bit Linux GNOME. As we all know 64 bit versions of software's are still not perfect to use, reason for 64 bit versions to work perfectly on PC or laptop machines it requires all processors and motherboard buses to support 64 bit and practically its not still the case because technology is still too costly and only high end Laptops supports it. None of Laptop manufacturer and assembling companies gives peoples assurance that 64 bit Operating Systems will run perfectly without software glitches. So for better performance, its still considered that we should install 32 bit versions of all such conflicting software's for example Flashplayer, Shockwave player etc. Lets learn how to install 32 bit Flash player over Backtrack Linux 5r3.

How to Install Flash Player v11 on Backtrack Linux 5r3
How to Install Flash Player v11 on Backtrack Linux 5r3

Backtrack Linux comes with pre installed Flash player version but that does not works correctly, so in order to correct this issue first of all we need to remove the existing copy of the Flash player installed on Firefox. 

Step 1 : Open the terminal in the Backtrack Linux and run the below commands in the terminal in order to remove the pre installed Flash Player.

aptitude purge flashplugin-nonfree flashplugin-installer gnash gnash-common mozilla-plugin-gnash swfdec-mozilla

rm -f /usr/lib/firefox/plugins/

rm -f /usr/lib/mozilla/plugins/

rm -f /usr/lib/mozilla/plugins/

rm -f /usr/lib/mozilla/plugins/npwrapper*flash*so

rm -f ~/.mozilla/plugins/*flash*so

Note aptitude purge command will remove files, dependencies, and configurations, while the latter removes files and dependencies. This removes the existing Flash Player.

Step 2 : In this step, Kill all the instances of Firefox over the Backtrack Linux. We can kill all the instances of Firefox by running below command in terminal:

killall -9 /opt/firefox/firefox-bin

Step 3 : In this step we will install latest Flash player over Backtrack Linux. We are using wget in terminal here, but if Adobe changes the download link, please change the command accordingly, or just download the Flash installer from their website. We will be using wget in the following:

Now run the below commands in the terminal to install:

tar xvzf install_flash_player_11_linux.i386.tar.gz

mkdir ~/.mozilla/plugins

mv ~/.mozilla/plugins/

Then just delete everything else that got extracted. You should be good to go, and Nessus should be running fine. 

That's all! Now enjoy all the software's over Backtrack Linux that requires Flash Player. 

Hope you all enjoyed! If you face any issues contact us by writing comments below.

Designed by Hackingloops.