How to’s

TOP 10 HACKING SOFTWARES

Top 10 Hacking Softwares 2012

V$care INC.








The tools listed here are open source and we are not listing any licensed software here.
Also I would like to add that METASPLOIT” has been excluded from this list because it combines the power of several tools listed in top 10 so here we will only rate individual products.


1. NMAP – And the tradition continues and NMAP still the number one
Nmap ,by far is the best security scanning and hacking tool ever made. This software tops every list of tophacking softwares for its two reasons. Firstly,its ease of use and secondly,its wide usage.
It provides a wide range of features like port scanning, fingureprinting, os detection , ping , scanning an IP range , alive hosts etc. It has a rich command mode for advanced users which can combine several commands together to execute ones. Its the most recomended tool for new as well as advanced learners and security experts. It hosts its google  opensource project every year. Download Nmap.





2.SUPER-SCAN-  Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.  If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice. It provides a cool scanning experience with lot of information displayed. Download Superscan.









3. NESSUS vulnerability scanner –  I believe that this is the only tool that can break the top spot of Nmap and reach at number 1. Its a powerful tool but owing to its nature of operation, it is a lot buggy and hangs too. This tool has been the best tool for both network administrators and hackers because of its wide implimentation.The Nessus® vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.Download Nessus



4. John The Riper – The fastest password cracker. It is available for several versions of unix and windows and has remained the all time favorite brute force password cracker.  currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes. Download JTR.




5. WIRESHARK and KISMET-  Improving by 2 points to reach the number 5th spot is wireshark. The 5th spot is combined spot for kismet as well as wireshark.
 It is the most preferred wireless security assessment tool and a single of its type in this field. It is a must have tool for all wireless junkies. Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames.  Download Wireshark.

Kismet is an 802.11 wireless network detector, sniffer, and intrusion detection system.  Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic (devices and drivers permitting). Download Kismet





6. PANGOLIN SQL injection scanner – This is by far the best SQL injection scanner which scans a website for sql injection attacks. It performs test on the database to check if vulnerability exists or not. The tool is built to scan numerous popular databases and works quiet effectively for poorly configured websites. It had a tough competition with Havij but the nature of platform made me to choose Pangolin as the winner in this segment. Download Pangolin







7. NIKTO 2- A fresh arival and a must have. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated. Download Nikto




8. Low orbit Ion Cannon- LOIC is an effective DOS attack tool which is said to have been made by the popular Anonymous hacking group. This tool can be used to flood a webserver with lots of data packets so that the service goes down and it becomes inaccessible. Recentely this tool was used to bring down PayPal and several other top websites around the globe.Download LOIC







9.CAIN & ABEL- The favourite password cracker of all kind. IT fell several ranks this year owing to its low support for new platform and stiff competition from several similar tools who are constantly updating.
Download Cain and Abel








10. HIDE IP-  There were several tools fighting for this last spot but the high usage of anonymous surfing made me to finally put Hide IP on the 10th spot. It is a great tool for anonymous surfing and having anonymity on the web which is very essential while performing hacks and penetration testing. It had TOR as is closest competitor but owing to the slow speed of TOR i decided Hide IP as the owner of this spot.
Download Platinum Hide IP






Hope you will love playing with these great tools. The list can be never ending as there can are numerous tools around. Before ending this post I will again like to remind my readers that a good hacker is one who understands the crux. Tools are mearly used to simplify our work. So forst understand things manuallythen only jump to using tools.

Copyright©Vscare Incorporation

Windows 8 Highly Compressed 10MB Full

Windows 8 Highly Compressed 10MB Full

Windows 8 Highly Compressed 10MB Full Free Download

\

Download From here

Microsoft has been adding and improving advanced security features and capabilities in its Windows operating system and other applications over the past few years. Each new version of Windows has featured improved security necessary to withstand the constant barrage of attacks and in Windows 8, Microsoft expanded its support for hardware security, bundling a full-blown security suite into the operating system, introducing secure-boot and signed applications.here i will share windows 8 latest version highly compressed in 11.2 MB it means that you have to download only 11.2 MB file to install windows 8 thumbs up !
Windows 8 This is Fully Packed windows 8 highly compressed after you extract it will become 3.49 GB then you again have to extract it to get full .iso file.this whole process of extracting will not take hours,this extraction will be completed in about 5 to 7 Minutes.
System Requirements:
Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2
RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)
Graphics card: Microsoft DirectX 9 graphics device with WDDM driver

Installation Instruction:
Unrar Highly Compressed Windows 8 ISO.
Burn the ISO file of Windows 8 on a DVD using UltraISo.
Install the windows. and Download the Activator Enjoy!
Some Useful Features:
  • Support for Both x86 PCs and ARM Tablets
  • Windows to Go
  • Windows Store
  • Windows 8 User Interface
  • Control Panel
  • Playing videos in Windows 8
  • Windows 8 Task Manager
  • Windows 8 works great on the same hardware that powers Windows 7
  • gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver
  • Taking advantage of touch input requires a screen that supports 

Bootable pendrive without any softwere

Bootable pendrive without any softwere

 

 

Installing Windows from a USB flash drive is more convenient and faster than optical discs. Plus, if you have a netbook or another type of computer without an optical drive, you don’t have any other choice than to use bootable USB media. In part four of our “What to do with your USB flash drive” series, we’ll show you how to configure your USB flash drive to install Windows 7. Here’s how:

Step 1: Open a command prompt with administrator privileges by clicking on the Start button, then type cmd in the search box and press Ctrl+Shift+Enter.

Step 2: At the command prompt, type diskpart to enter the diskpart utility.

Step 3: At the DISKPART> prompt, type list disk.

Step 4: Type select disk 4, where “4” is the number of your USB flash drive from the list.

Step 5: Type clean to clean the USB flash drive.

Step 6: Type create partition primary.

Step 7: Type active, to make the partition active.

Step 8: Type format fs=fat32 quick to format the USB flash drive quickly in the FAT32 file system.

Step 9: Type assign to have Windows assign a drive letter to the drive. Type exit to leave diskpart and type exit again to close the command prompt.

Diskpart(Credit: Screenshot by Ed Rhee)

Step 10: Insert your Windows 7 disc into your computer and copy all the files to the USB flash drive.

 

That’s it. Once the Windows 7 files have completed copying, insert your USB flash drive into a computer and boot it up to start the Windows 7 installation. Just make sure that the BIOS is set to boot the USB flash drive first. On some computers, you can press an F key to set boot options.