Saturday 26 September 2015

1000 Hacking tutorials in an 6mb zip file presented to you by Black Hack


These are  the BEST OF HACKING TUTORIALS OF 2015:>>

Includes The Following:
    How To Add An Option To Print, the Contents of a Folder!.txt
    How To Add Your Own Windows Tips.txt
    How to Back Up the Registry.txt
    How To Backup Ps2 Games.txt
    HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt
    How To Block Websties Without Software, block websites.txt
    How To Boot Xp Faster (updated).txt
    How to build a black box.txt
    how to burn quicker in windows xp.txt
    How to Bypass BIOS Passwords.txt
    How To Bypass Web Filters, tutorial.txt
    HOW TO CAPTURE STREAMING MEDIA.txt
    How To Change A Cmos Battery.txt
    How to change the serial number used in Windows XP, Valid for XP Corporate.txt
    How To Change Thumbnail Size And Quality.txt
    How to clear Bios info 2.txt
    How to clear Bios info.txt
    How To Convert File System, fat – fat32 to ntfs.txt
    How To Copy A Dvd Which Will Play On A X Box.txt
    How to copy songs from your iPod to your PC.txt
    How To Customise Your start Button.txt
    How To Delete Those Persistent Nasty Files.txt 0.53 kB
    How To Directly Go To Inbox.txt 0.35
    How To Find Serial Numbers On Google.txt 0.79 kB
    How to fix corrupted files in XP.txt 1.48 kB
    How to fix Windows Installer problem.txt 0.96 kB
    How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB
    HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB
    How to Get someones ISP password, Get free internet.txt 2.65 kB
    How To Get Top Ranking, Search Engines.txt 6.58 kB
    How To Hack Windows Xp Admin Passwords.txt 2.52 kB
    How to hack-change your Windows XP Boot Screen.txt 1.52 kB
    how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB
    How To Make An Animted Logo.txt 5.26 kB
    How To Make Free Phone Calls.txt 2.29 kB
    How to make key generators.txt 8.83 kB
    How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB
    How To Make XP Go Faster.txt 5.58 kB
    How To make your own Radio Station 2.txt 3.26 kB
    How To Make Your Own Radio Station.txt 1.58 kB
    How to Remove DRM Protection for Video Files.txt 2.29 kB
    How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB
    How To Remove Signin Details Of Msn Passport.txt 1.04 kB
    How To Remove The Default Admin$ Shares.txt 1.03 kB
    How to remove the Links folder in IE Favorites.txt 0.59 kB
    How to Remove WinXP Splash and See Operations.txt 1.19 kB
    How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB
    How to Rename File Extensions.txt 3.11 kB
    How To Rename Multiple Files In Winxp.txt 0.56 kB
    How To Restrict Login Hours Allowed.txt 0.58 kB
    How to safeguard your files when computer crashes.txt 2.94 kB
    How to save Windows xp updates.txt 0.63 kB
    how to search google for RAPIDSHARE links.txt 0.98 kB
    How To See Hidden Files, Using Dos.txt 0.08 kB
    How To Set search For All Files In Winxp.txt 0.71 kB
    How to set up a http server running from you computer.txt 3.06 kB
    How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB
    How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB
    How To Set Up Direct Connect.txt 26.96 kB
    HOW TO SET UP FTP SERVER.txt 1.79 kB
    How To Set Up Proxies In Your Browser.txt 1.63 kB
    How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB
    How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB
    How To Speed Up A Slow Computer.txt 1.21 kB
    How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB
    How To Stop Spam.txt 8.05 kB
    How to swear in all languages.txt 28.32 kB
    How To Unload Cached Dll Files To Free Memory.txt 0.56 kB
    How to Use and How to Chain Multiple Proxies!.txt 9.70 kB
    How To Use File Compression In Windows Xp.txt 4.19 kB
    How To Use Google To Download Mp3's, and applications…..txt 0.60 kB
    How To Use Newsgroups.txt 0.56 kB
    How To Use You Gmail With Msn Messenger.txt 0.37 kB
    How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB
    HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB
    New Hacking Ebooks/A Basic UNIX Overview.rtf 22.46 kB
    New Hacking Ebooks/A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB
    New Hacking Ebooks/A Novice’s Guide to Hacking 2004.txt 40.75 kB
    New Hacking Ebooks/A Novice’s Guide To Hacking.txt 8.58 kB
    New Hacking Ebooks/A Short HACKER SPEAK Glossary.txt 9.78 kB
    New Hacking Ebooks/A simple TCP spoofing attack.txt 14.60 kB
    New Hacking Ebooks/Accessing the bindery files directly.txt 3.97 kB
    New Hacking Ebooks/An Architectural Overview of UNIX Network Security.htm 53.27 kB
    New Hacking Ebooks/Anonymity complete GUIDE.rtf 28.90 kB
    New Hacking Ebooks/ANONYMOUS emails.txt 3.15 kB
    New Hacking Ebooks/Anonymous FTP FAQ.htm 28.14 kB
    New Hacking Ebooks/ANSIBombs II Tips And Techniques.txt 10.05 kB
    New Hacking Ebooks/attacks on networks how to stop.htm 67.77 kB
    New Hacking Ebooks/Backdoor.txt 18.71 kB
    New Hacking Ebooks/Backdoors.txt 19.15 kB
    New Hacking Ebooks/BBS CRASHING TECHNIQUES.txt 3.72 kB
    New Hacking Ebooks/Bust Avoidance For ~censored~.txt 5.82 kB
    New Hacking Ebooks/Firewall Protection how to.rtf 33.12 kB
    New Hacking Ebooks/Guide to Hacking with sub7.doc 106.00 kB
    New Hacking Ebooks/hacking and phreaking.doc 168.00 kB
    New Hacking Ebooks/Hacking for Dummies Volume 2.doc 147.00 kB
    New Hacking Ebooks/Hacking For Newbies.doc 54.00 kB
    New Hacking Ebooks/hacking in telnet.txt 57.47 kB
    New Hacking Ebooks/hacking on Telnet explained.doc 16.25 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB
    New Hacking Ebooks/hacking password protected site.doc 26.50 kB
    New Hacking Ebooks/Hacking Password Protected Website’s.doc 3.06 kB
    New Hacking Ebooks/hacking passwords.doc 26.50 kB
    New Hacking Ebooks/How to learn to hack in easy steps.doc 100.00 kB
    New Hacking Ebooks/How to use the Web to look up information on hacking.doc 16.28 kB
    New Hacking Ebooks/IP how to.rtf 5.15 kB
    New Hacking Ebooks/NetBios explained.doc 26.68 kB
    New Hacking Ebooks/Proxy how to.rtf 3.13 kB
    New Hacking Ebooks/Routing Basics.pdf 30.25 kB
    New Hacking Ebooks/telnet trick port 25.doc 1.76 kB
    New Hacking Ebooks/Yahoo Chat Commands how to.rtf 0.93 kB
    New Pc Or New Motherboard.txt 3.77 kB
    New Way To Relive Some Zinio File.txt 1.95 kB
    Phreaking/2600 Hertz Single Tone Generator Schematic.txt 1.95 kB
    Phreaking/A List of every TeleNet code that there is.txt 1.96 kB
    Phreaking/A List Of Government BBS Numbers.txt 13.07 kB
    Phreaking/An Extensive Guide to Bell System Man Holes.txt 10.10 kB
    Phreaking/An Introduction into TeleScan.txt 3.98 kB
    Phreaking/An Introductory Guide To TeleNet Commands.txt 2.20 kB
    Phreaking/Area Codes and Time Zones.txt 4.90 kB
    Phreaking/Becoming A Phreaker – The Quick n’ Easy Way.txt 17.09 kB
    Phreaking/Bell Hell Volume #1.txt 10.29 kB
    Phreaking/Bell Hell Volume #2.txt 15.92 kB
    Phreaking/Breaker B0X.txt 1.96 kB
    Phreaking/busybox.txt 1.61 kB
    Phreaking/Cellular Listening with a TV .txt 1.96 kB
    Phreaking/Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB
    Phreaking/Drake’s Phreaking Tutorial.txt 3.34 kB
    Phreaking/Hacking VoiceMail Systems.txt 25.89 kB
    Phreaking/How BT phone cards works.txt 4.18 kB
    Phreaking/How Phone Phreaks are Caught.txt 12.00 kB
    Phreaking/How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB
    Phreaking/How to make a Free Phone Call.txt 2.16 kB
    Phreaking/How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB
    Phreaking/Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB
    Phreaking/Phreakers Handbook.txt 9.83 kB
    Phreaking/Quick Phone Modifications.txt 4.12 kB
    Phreaking/The ABC’s of Payphones part 1.txt 2.58 kB
    Phreaking/The ABC’s of Payphones part 2.txt 2.12 kB
    Phreaking/The ABC’s of Payphones part 3.txt 2.21 kB
    Phreaking/The ABC’s of Payphones part 4.txt 2.64 kB
    Phreaking/ThE Beige BoX .txt 6.23 kB
    Phreaking/The History of British Phreaking.htm 8.29 kB
    Phreaking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
    Phreaking/The Moterola Bible.txt 116.99 kB
    Phreaking/The Myth of the 2600Hz Detector .txt 6.55 kB
    Phreaking/The Official Phreaker’s Manual.txt 499.25 kB
    Phreaking/The Phreakers Handbook-1.txt 62.87 kB
    Phreaking/The Telephone Works.txt 9.25 kB
    Phreaking/The Ultimate Phreaking Guide .txt 1.96 kB
    Phreaking/Understanding the Telephone System.txt 16.34 kB
    Phreaking/Zen and the Art of Fone Phreaking `97 .txt 66.74 kB
    Tutorials – blacksun.box.sk/coding/Base Number Systems.html 7.78 kB
    Tutorials – blacksun.box.sk/coding/BASIC C Socket Programming In Unix .txt 21.50 kB
    Tutorials – blacksun.box.sk/coding/Basics of am 3mp33j3w.txt 18.64 kB
    Tutorials – blacksun.box.sk/coding/Batch File Programming.txt 41.70 kB
    Tutorials – blacksun.box.sk/coding/BOOLEAN LOGIC GATES.html 14.04 kB
    Tutorials – blacksun.box.sk/coding/C++ Tutorial By Clayman.html 23.77 kB
    Tutorials – blacksun.box.sk/coding/Creating A Simple Hit Counter In PHP.html 8.77 kB
    Tutorials – blacksun.box.sk/coding/Creating A Simple Search Engine In PHP.html 9.62 kB
     ----------and many more-----------

Download Links>>


Download from server 1: (Mediafire)
Download from server 2: (Ziddu)

    NOTE:THESE ARE ONLY FOR EDUCATIONAL PURPOSES ONLY IF MISUSED NOT MY RESPONSIBILTY.

-- A Black Hack Post

Thursday 24 September 2015

World's Top Wi-Fi Hacking Books

Download free from Black Hack:


List of Books provided:

1. Wi-Fi Hacking For Dummies.
    Download From Server 1 (ziddu.com)
    Download From Server 2 (Mediafire.com)

2. Hack Wi-Fi On Windows.
    Download From Server 1 (ziddu.com)
    Download From Server 2 (Mediafire.com)

3. Wifi Hacking Articles By Black Hack:
    Download From Server 1 (ziddu.com)
    Download From Server 2 (Mediafire.com)

4. Wifi Hacking For Advance Hacker
    Download From Server 1 (ziddu.com)
    Download From Server 2 (Mediafire.com)

--A Black Hack: Post

The Hacker's Manual-2015 Download free pdf

The Hackers's Manual-2015 -A TECHACTIVE series book.

Take you Linux Skills to the next level
Full and Highly Compressed for you.



Content

1. 146+ Pages of the best linux tutorials
2. 80+ Hacks to make you a linux power user
3. From security tricks to sysadmin secrets.
4. Hardware Hacks -learn how to do it all!
5. Networking .
6. Hacking.
7. Privacy.
8. 100% Safe, 100% Legal
.
.
And much more in a single book.

Download Links:

Download from server 1 (Ziddu.com):

Download from server 2 (Mediafire.com):

-- A Black Hack: Post

Wednesday 23 September 2015

DOWNLOAD THE SECRET OF HACKING- I EDITION

Download Highly Compressed PDF 1.72 MB Only-

The Secret Of Hacking  is awesome for those who have no knowledge in hacking and want to learn hacking, its good start up for them. It has got many tutorials especially for beginners . One can learn basics of hacking using this ebook , The Secret of Hacking. Today,I'm providing Free Download Link to download the secret of hacking.Feel Free To learn Hacking !!!!
I'll provide the latest edition of this ebook very soon..So stay tuned and till that download The Secrets of Hacker Ist edition and read it thoroughly and hack the universe..

Table Of Content:

1. INTRODUCTION TO REAL HACKING
---What is Hacking?
---Understanding the Need to Hack Your Own Systems
---History of Hacking
---Top 5 Most Famous Hackers of All Times
---Real Hacking Process*
---How to Find Latest Exploits?
2. ADVANCED MALWARE RESEARCH
3. WINDOWS HACKING
4. PASSWORD HACKING
5. EMAIL HACKING
6. WEB APPLICATION HACKING
7. WEBSITE DEFACEMENT & DOMAIN HACKING
8. MISCELLANEOUS HACKING
9. MOBILE & COMPUTER FORENSIC
10. VOIP & WIRELESS HACKING
11. VULNERABILITY DISCOVERY & PENETRATION TESTING
12. ADVANCE HACKING WITH METASPLOIT
13. FIREWALL, IDS & HONEY POT HACKING.
14. SECURING SYSTEM & NETWORKS
.
.
.
And much more in a single pdf

Download Links:

Download from server 1 (Ziddu.com)

Download from server 2 (Mediafire.com)

-- A Black Hack: Post

Thursday 17 September 2015

30+ Hacking Books Collection - By Black Hack

Download 30+ Hacking Books Collection - By Black Hack 

Highly Compressed 20MB W/O Password

and give a boost to your hacking carrier.

   Index:

    Hacking for dummies.pdf
    How to Crack CD Protections.pdf
    Untold Windows Tips And Secrets.pdf
    1593270070.chm
    Algorithms Explained.doc
    Ankit Fadia Hacking Guide.pdf
    Base64 Encoding Torn Apart.doc
    Batch File Programming - Ankit Fadia.pdf
    Closing Open Holes.doc
    Defacing Websites A Step By Step Process .pdf
    Dos Attacked.pdf
    Encryption Algorithms Explained.pdf
    firewalls.doc
    FTP Exploits By Ankit Fadia.pdf
    Gathering Info on Remote Host.doc
    Getting geographical Information using an IP Address.doc
    Hacking into Linux.doc
    hacking_gmail.pdf
    Hardcore Windows XP - The Step by Step Guide To Ultimate Performance.pdf
    More Password Cracking Decrypted.doc
    Removing Banners from your site.doc
    Sendmail and Beyond.doc
    SSL Torn Apart.doc
    Syngress.Asterisk.Hacking.May.2007.pdf
    TCP Wrappers Unwrapped.doc
    Tracing IP,DNS,WHOIS-nsLOOKUP.pdf
    Transparent Proxies in Squid.doc
    Transparent_proxies_with_Squid.pdf
    Untold Windows Tips and Secrets.doc
    Windows Password Files Torn Apart.doc 

Download From Here:

 -- A Black Hack: post

Download EaseUS Data Recovery Wizard Technician 9.0.0+Crack

EaseUS Data Recovery Wizard Technician 9.0.0 -Download free+Crack

Highly Compressed(23.7 MB), Without Password

--By Black Hack:



ScreenShot:


Professional data recovery software is compatible with Dynamic Disk and Linux File System. It will help computer users out of all data loss problems. EaseUS Data Recovery Wizard Professional does an amazing job on format recovery, unformat, deleted files recovery or lost data due to partition loss or damage, software crash, virus infection, unexpected shutdown or any other unknown reasons when the data loss disaster strikes, especially when you want to recover data from formatted drive. It provides the most comprehensive data recovery solution for computer users to recover lost data.

Benefits of EaseUS Data Recovery Wizard Professional
* Complete and effective recovery: recover all lost data including documents, emails, photos, videos, audio files and more.
* Safe and easy to use: friendly recovery wizard applies to all levels of computer users and most importantly it works no damage to your data.
* Preview before recovery: preview function helps you to locate your lost files and check their quality before you decide to recover them.
* Total recovery: not only recover files from hard drives, but also get lost data back from RAID, dynamic disks, USBs, external hard drives, memory cards, digital cameras, MP3/MP4 players and more.

When to use?:
Hard Drives that have been formatted.
Corruptted or missing critical file system structures.
• Accidental file deletion.
• File loss without reason.
• Unexpected system shutdown or application failure.
• Computer viruses and worms infection or corruption.
• Boot-up problems.
• Partition structures are damaged or deleted.
• Damage due to a power failure or surge.
• Recover files from devices with unknown file systems including Hard Disk, external ZIP/USB drive, removable SmartMedia, MemoryStick, SD cards, etc.

Key Features:
• Recover files from unreadable Dynamic Disk.
• Recover Linux files in Windows Systems.
• Recover deleted or lost files emptied from the Recycle Bin.
• File recovery after accidental format, even if you have reinstalled Windows.
• Disk recovery after a hard disk crash.
• Get back files after a partitioning error or hard disk crash.
• Get data back from RAW hard drives.
• Recover office document, photo, image, video, music, email, etc.
• Recover from hard drive, USB drive, memory card, memory stick, camera card, Zip, floppy disk or other storage media.
• Support FAT12, FAT16, FAT32, NTFS/NTFS5, EXT2/EXT3 file systems.
• New! Windows 2000/XP/2003/Vista/2008/Windows 7
• High quality of file recovery.
• Bootable media based on WinPE.
• Free file repair service.

EaseUS Data Recovery Wizard WinPE Edition is designed for data recovery in case of any boot-up or system crash problem. There is no need for user to install it so the risk of overwriting lost data could be lowest and it will help computer users out of all data loss problems, format recovery, and recovering deleted files emptied from the Recycle Bin, or data loss due to partition loss or damage, software crash and other unknown reasons.

Recover Data after System Crash or Boot Problems with EaseUS Data Recovery Wizard Professional
- Data recovery boot disk to facilitate data recovery when operating system is damaged
- Non-destructive Windows data recovery software for lost data recovery
- No need to install. Run data recovery software from WinPE bootable CD

Supported OS: Windows 8/7/Vista/XP/2000 and Windows Server 2012/2008/2003

Installation Instructions:
  • Install program.
  • Register application it is pre-cracked.
  • Done, Enjoy. 

Download Links :

Download from Server 1 (ziddu.com)

Download from server 2 (mediafire.com)

-- A Post by Black Hack:

Tuesday 15 September 2015

Download Batch file programming -By Premkumar.S

Batch File Programming -By Premkumar.S is a greatest book on Batch file programming and cmd command, it include all cmd command in depth and how viruses of windows design and works, so if you really command on Windows then this book if for you>>
So it is a book a hacker must have>>



About:Batch File programming:

Batch file programming is the native programming offered by the Microsoft Windows Operating System. Batch  file  is  created  using  any  text  editors  like  notepad,  WordPad,  WinWord or  so  on,  which comprises  of  a  sequence  of  built-in  commands  used  to  perform  some  often  done  tasks  like  deleting  a series  of  files  of  same  type  or  of  different  type, creating  logs,  clearing  unwanted  craps  from  your computer and even for creating a batch VIRUS.

Whenever a Batch program is executed, it was interpreted line-by-line by the CLI (Command Line Interpreter) command.com or the cmd.exe. Batch file is really helpful in automating tedious tasks and for maintaining system logs. The commands used while creating a batch file are case insensitive, in the sense that it may accept both small and upper case letters.......... to be continued in the book>>

Download Links:

Download from server 1 (Ziddu.com):

Download from server 2 (mediafire.com):

-- A Black Hack: Post

Monday 14 September 2015

Basic Networking Terms and Protocols every hacker must know

An Introduction to Networking Terminology, Interfaces, and Protocols

A basic understanding of networking is important for anyone managing a server. Not only is it essential for getting your services online and running smoothly, it also gives you the insight to diagnose problems.
This document will provide a basic overview of some common networking concepts. We will discuss basic terminology, common protocols, and the responsibilities and characteristics of the different layers of networking.
This guide is operating system agnostic, but should be very helpful when implementing features and services that utilize networking on your server.

Networking Glossary

Before we begin discussing networking with any depth, we must define some common terms that you will see throughout this guide, and in other guides and documentation regarding networking.
These terms will be expanded upon in the appropriate sections that follow:

•Connection: In networking, a connection refers to pieces of related information that are transfered through a network. This generally infers that a connection is built before the data transfer (by following the procedures laid out in a protocol) and then is deconstructed at the at the end of the data transfer.

•Packet: A packet is, generally speaking, the most basic unit that is transfered over a network. When communicating over a network, packets are the envelopes that carry your data (in pieces) from one end point to the other.
Packets have a header portion that contains information about the packet including the source and destination, timestamps, network hops, etc. The main portion of a packet contains the actual data being transfered. It is sometimes called the body or the payload.

•Network Interface: A network interface can refer to any kind of software interface to networking hardware. For instance, if you have two network cards in your computer, you can control and configure each network interface associated with them individually.

A network interface may be associated with a physical device, or it may be a representation of a virtual interface. The "loopback" device, which is a virtual interface to the local machine, is an example of this.

•LAN: LAN stands for "local area network". It refers to a network or a portion of a network that is not publicly accessible to the greater internet. A home or office network is an example of a LAN.

•WAN: WAN stands for "wide area network". It means a network that is much more extensive than a LAN. While WAN is the relevant term to use to describe large, dispersed networks in general, it is usually meant to mean the internet, as a whole.
If an interface is said to be connected to the WAN, it is generally assumed that it is reachable through the internet.

•Protocol: A protocol is a set of rules and standards that basically define a language that devices can use to communicate. There are a great number of protocols in use extensively in networking, and they are often implemented in different layers.
Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and FTP.

•Port: A port is an address on a single machine that can be tied to a specific piece of software. It is not a physical interface or location, but it allows your server to be able to communicate using more than one application.

•Firewall: A firewall is a program that decides whether traffic coming into a server or going out should be allowed. A firewall usually works by creating rules for which type of traffic is acceptable on which ports. Generally, firewalls block ports that are not used by a specific application on a server.

•NAT: NAT stands for network address translation. It is a way to translate requests that are incoming into a routing server to the relevant devices or servers that it knows about in the LAN. This is usually implemented in physical LANs as a way to route requests through one IP address to the necessary backend servers.

•VPN: VPN stands for virtual private network. It is a means of connecting separate LANs through the internet, while maintaining privacy. This is used as a means of connecting remote systems as if they were on a local network, often for security reasons.
There are many other terms that you may come across, and this list cannot afford to be exhaustive. We will explain other terms as we need them. At this point, you should understand some basic, high-level concepts that will enable us to better discuss the topics to come.

Network Layers

While networking is often discussed in terms of topology in a horizontal way, between hosts, its implementation is layered in a vertical fashion throughout a computer or network.

What this means is that there are multiple technologies and protocols that are built on top of each other in order for communication to function more easily. Each successive, higher layer abstracts the raw data a little bit more, and makes it simpler to use for applications and users.
It also allows you to leverage lower layers in new ways without having to invest the time and energy to develop the protocols and applications that handle those types of traffic.

The language that we use to talk about each of the layering scheme varies significantly depending on which model you use. Regardless of the model used to discuss the layers, the path of data is the same.

As data is sent out of one machine, it begins at the top of the stack and filters downwards. At the lowest level, actual transmission to another machine takes place. At this point, the data travels back up through the layers of the other computer.
Each layer has the ability to add its own "wrapper" around the data that it receives from the adjacent layer, which will help the layers that come after decide what to do with the data when it is passed off.

OSI Model

Historically, one method of talking about the different layers of network communication is the OSI model. OSI stands for Open Systems Interconnect.

This model defines seven separate layers. The layers in this model are:

•Application: The application layer is the layer that the users and user-applications most often interact with. Network communication is discussed in terms of availability of resources, partners to communicate with, and data synchronization.

•Presentation: The presentation layer is responsible for mapping resources and creating context. It is used to translate lower level networking data into data that applications expect to see.

•Session: The session layer is a connection handler. It creates, maintains, and destroys connections between nodes in a persistent way.

•Transport: The transport layer is responsible for handing the layers above it a reliable connection. In this context, reliable refers to the ability to verify that a piece of data was received intact at the other end of the connection.
This layer can resend information that has been dropped or corrupted and can acknowledge the receipt of data to remote computers.

•Network: The network layer is used to route data between different nodes on the network. It uses addresses to be able to tell which computer to send information to. This layer can also break apart larger messages into smaller chunks to be reassembled on the opposite end.

•Data Link: This layer is implemented as a method of establishing and maintaining reliable links between different nodes or devices on a network using existing physical connections.

•Physical: The physical layer is responsible for handling the actual physical devices that are used to make a connection. This layer involves the bare software that manages physical connections as well as the hardware itself (like Ethernet).
As you can see, there are many different layers that can be discussed based on their proximity to bare hardware and the functionality that they provide.

TCP/IP Model

The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model that is simpler and has been widely adopted. It defines the four separate layers, some of which overlap with the OSI model:

•Application: In this model, the application layer is responsible for creating and transmitting user data between applications. The applications can be on remote systems, and should appear to operate as if locally to the end user.
The communication is said to take place between peers.

•Transport: The transport layer is responsible for communication between processes. This level of networking utilizes ports to address different services. It can build up unreliable or reliable connections depending on the type of protocol used.

•Internet: The internet layer is used to transport data from node to node in a network. This layer is aware of the endpoints of the connections, but does not worry about the actual connection needed to get from one place to another. IP addresses are defined in this layer as a way of reaching remote systems in an addressable manner.

•Link: The link layer implements the actual topology of the local network that allows the internet layer to present an addressable interface. It establishes connections between neighboring nodes to send data.

As you can see, the TCP/IP model, is a bit more abstract and fluid. This made it easier to implement and allowed it to become the dominant way that networking layers are categorized.

Interfaces

Interfaces are networking communication points for your computer. Each interface is associated with a physical or virtual networking device.
Typically, your server will have one configurable network interface for each Ethernet or wireless internet card you have.
In addition, it will define a virtual network interface called the "loopback" or localhost interface. This is used as an interface to connect applications and processes on a single computer to other applications and processes. You can see this referenced as the "lo" interface in many tools.

Many times, administrators configure one interface to service traffic to the internet and another interface for a LAN or private network.
In DigitalOcean, in datacenters with private networking enabled, your VPS will have two networking interfaces (in addition to the local interface). The "eth0" interface will be configured to handle traffic from the internet, while the "eth1" interface will operate to communicate with the private network.

Protocols

Networking works by piggybacking a number of different protocols on top of each other. In this way, one piece of data can be transmitted using multiple protocols encapsulated within one another.

We will talk about some of the more common protocols that you may come across and attempt to explain the difference, as well as give context as to what part of the process they are involved with.

We will start with protocols implemented on the lower networking layers and work our way up to protocols with higher abstraction.

Media Access Control

Media access control is a communications protocol that is used to distinguish specific devices. Each device is supposed to get a unique MAC address during the manufacturing process that differentiates it from every other device on the internet.

Addressing hardware by the MAC address allows you to reference a device by a unique value even when the software on top may change the name for that specific device during operation.

Media access control is one of the only protocols from the link layer that you are likely to interact with on a regular basis.

IP

The IP protocol is one of the fundamental protocols that allow the internet to work. IP addresses are unique on each network and they allow machines to address each other across a network. It is implemented on the internet layer in the IP/TCP model.
Networks can be linked together, but traffic must be routed when crossing network boundaries. This protocol assumes an unreliable network and multiple paths to the same destination that it can dynamically change between.
There are a number of different implementations of the protocol. The most common implementation today is IPv4, although IPv6 is growing in popularity as an alternative due to the scarcity of IPv4 addresses available and improvements in the protocols capabilities.

ICMP

ICMP stands for internet control message protocol. It is used to send messages between devices to indicate the availability or error conditions. These packets are used in a variety of network diagnostic tools, such as ping and traceroute.
Usually ICMP packets are transmitted when a packet of a different kind meets some kind of a problem. Basically, they are used as a feedback mechanism for network communications.

TCP

TCP stands for transmission control protocol. It is implemented in the transport layer of the IP/TCP model and is used to establish reliable connections.

TCP is one of the protocols that encapsulates data into packets. It then transfers these to the remote end of the connection using the methods available on the lower layers. On the other end, it can check for errors, request certain pieces to be resent, and reassemble the information into one logical piece to send to the application layer.

The protocol builds up a connection prior to data transfer using a system called a three-way handshake. This is a way for the two ends of the communication to acknowledge the request and agree upon a method of ensuring data reliability.

After the data has been sent, the connection is torn down using a similar four-way handshake.

TCP is the protocol of choice for many of the most popular uses for the internet, including WWW, FTP, SSH, and email. It is safe to say that the internet we know today would not be here without TCP.

UDP

UDP stands for user datagram protocol. It is a popular companion protocol to TCP and is also implemented in the transport layer.
The fundamental difference between UDP and TCP is that UDP offers unreliable data transfer. It does not verify that data has been received on the other end of the connection. This might sound like a bad thing, and for many purposes, it is. However, it is also extremely important for some functions.

Because it is not required to wait for confirmation that the data was received and forced to resend data, UDP is much faster than TCP. It does not establish a connection with the remote host, it simply fires off the data to that host and doesn't care if it is accepted or not.

Because it is a simple transaction, it is useful for simple communications like querying for network resources. It also doesn't maintain a state, which makes it great for transmitting data from one machine to many real-time clients. This makes it ideal for VOIP, games, and other applications that cannot afford delays.

HTTP

HTTP stands for hypertext transfer protocol. It is a protocol defined in the application layer that forms the basis for communication on the web.
HTTP defines a number of functions that tell the remote system what you are requesting. For instance, GET, POST, and DELETE all interact with the requested data in a different way.

FTP

FTP stands for file transfer protocol. It is also in the application layer and provides a way of transferring complete files from one host to another.

It is inherently insecure, so it is not recommended for any externally facing network unless it is implemented as a public, download-only resource.

DNS

DNS stands for domain name system. It is an application layer protocol used to provide a human-friendly naming mechanism for internet resources. It is what ties a domain name to an IP address and allows you to access sites by name in your browser.

SSH

SSH stands for secure shell. It is an encrypted protocol implemented in the application layer that can be used to communicate with a remote server in a secure way. Many additional technologies are built around this protocol because of its end-to-end encryption and ubiquity.
There are many other protocols that we haven't covered that are equally important. However, this should give you a good overview of some of the fundamental technologies that make the internet and networking possible.

Conclusion

At this point, you should be familiar with some basic networking terminology and be able to understand how different components are able to communicate with each other. This should assist you in understanding other articles and the documentation of your system.

-- A Black Hack: Post

Very Useful Run Commands In Windows

Here i bring some new and very usefull windows run commands>>

1. Open RUN(Win+R)
2. Enter any command from list below.

In this article a complete list of Run Commands in Windows 7 and 8 . These commands allows to quickly access features and applications to customize operative system environment.

These run commands are available for almost all settings available in Windows control panel.

Note : most part of these commands are compatible with Windows 7, Vista e Windows XP.

As someone has kindly reported, some commands are not compatible between different versions. Please check the commands and use the correct ones for your version of the operating system. Technical feedbacks are always appreciated, please send me any info that it helpful to improve this article.

List of Useful Run Commands in Windows

To Access… Run Command
Accessibility Controls access.cpl
Accessibility Wizard accwiz
Add Hardware Wizard hdwwiz.cpl
Add/Remove Programs appwiz.cpl
Administrative Tools control admintools
Adobe Acrobat (if installed) acrobat
Adobe Designer (if installed) formdesigner
Adobe Distiller (if installed) acrodist
Adobe ImageReady (if installed) imageready
Adobe Photoshop (if installed) photoshop
Automatic Updates wuaucpl.cpl
Bluetooth Transfer Wizard fsquirt
Calculator calc
Certificate Manager certmgr.msc
Character Map charmap
Check Disk Utility chkdsk
Clipboard Viewer clipbrd
Command Prompt cmd
Component Services dcomcnfg
Computer Management compmgmt.msc
Control Panel control
Date and Time Properties timedate.cpl
DDE Shares ddeshare
Device Manager devmgmt.msc
Direct X Control Panel (if installed)* directx.cpl
Direct X Troubleshooter dxdiag
Disk Cleanup Utility cleanmgr
Disk Defragment dfrg.msc
Disk Management diskmgmt.msc
Disk Partition Manager diskpart
Display Properties control desktop
Display Properties desk.cpl
Display Properties (w/Appearance Tab Preselected) control color
Dr. Watson System Troubleshooting Utility drwtsn32
Driver Verifier Utility verifier
Event Viewer eventvwr.msc
Files and Settings Transfer Tool migwiz
File Signature Verification Tool sigverif
Findfast findfast.cpl
Firefox (if installed) firefox
Folders Properties folders
Fonts control fonts
Fonts Folder fonts
Free Cell Card Game freecell
Game Controllers joy.cpl
Group Policy Editor (XP Prof) gpedit.msc
Hearts Card Game mshearts
Help and Support helpctr
HyperTerminal hypertrm
Iexpress Wizard iexpress
Indexing Service ciadv.msc
Internet Connection Wizard icwconn1
Internet Explorer iexplore
Internet Properties inetcpl.cpl
Internet Setup Wizard inetwiz
IP Configuration (Display Connection Configuration) ipconfig /all
IP Configuration (Display DNS Cache Contents) ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns
IP Configuration (Release All Connections) ipconfig /release
IP Configuration (Renew All Connections) ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns
IP Configuration (Display DHCP Class ID) ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid
Java Control Panel (if installed) jpicpl32.cpl
Java Control Panel (if installed) javaws
Keyboard Properties control keyboard
Local Security Settings secpol.msc
Local Users and Groups lusrmgr.msc
Logs You Out Of Windows logoff
Malicious Software Removal Tool mrt
Microsoft Access (if installed) msaccess
Microsoft Chat winchat
Microsoft Excel (if installed) excel
Microsoft Frontpage (if installed) frontpg
Microsoft Movie Maker moviemk
Microsoft Paint mspaint
Microsoft Powerpoint (if installed) powerpnt
Microsoft Word (if installed) winword
Microsoft Syncronization Tool mobsync
Minesweeper Game winmine
Mouse Properties control mouse
Mouse Properties main.cpl
Nero (if installed) nero
Netmeeting conf
Network Connections control netconnections
Network Connections ncpa.cpl
Network Setup Wizard netsetup.cpl
Notepad notepad
Nview Desktop Manager (if installed) nvtuicpl.cpl
Object Packager packager
ODBC Data Source Administrator odbccp32.cpl
On Screen Keyboard osk
Opens AC3 Filter (if installed) ac3filter.cpl
Outlook Express msimn
Paint pbrush
Password Properties password.cpl
Performance Monitor perfmon.msc
Performance Monitor perfmon
Phone and Modem Options telephon.cpl
Phone Dialer dialer
Pinball Game pinball
Power Configuration powercfg.cpl
Printers and Faxes control printers
Printers Folder printers
Private Character Editor eudcedit
Quicktime (If Installed) QuickTime.cpl
Quicktime Player (if installed) quicktimeplayer
Real Player (if installed) realplay
Regional Settings intl.cpl
Registry Editor regedit
Registry Editor regedit32
Remote Access Phonebook rasphone
Remote Desktop mstsc
Removable Storage ntmsmgr.msc
Removable Storage Operator Requests ntmsoprq.msc
Resultant Set of Policy (XP Prof) rsop.msc
Scanners and Cameras sticpl.cpl
Scheduled Tasks control schedtasks
Security Center wscui.cpl
Services services.msc
Shared Folders fsmgmt.msc
Shuts Down Windows shutdown
Sounds and Audio mmsys.cpl
Spider Solitare Card Game spider
SQL Client Configuration cliconfg
System Configuration Editor sysedit
System Configuration Utility msconfig
System File Checker Utility (Scan Immediately) sfc /scannow
System File Checker Utility (Scan Once At The Next Boot) sfc /scanonce
System File Checker Utility (Scan On Every Boot) sfc /scanboot
System File Checker Utility (Return Scan Setting To Default) sfc /revert
System File Checker Utility (Purge File Cache) sfc /purgecache
System File Checker Utility (Sets Cache Size to size x) sfc /cachesize=x
System Information msinfo32
System Properties sysdm.cpl
Task Manager taskmgr
TCP Tester tcptest
Telnet Client telnet
Tweak UI (if installed) tweakui
User Account Management nusrmgr.cpl
Utility Manager utilman
Windows Address Book wab
Windows Address Book Import Utility wabmig
Windows Backup Utility (if installed) ntbackup
Windows Explorer explorer
Windows Firewall firewall.cpl
Windows Magnifier magnify
Windows Management Infrastructure wmimgmt.msc
Windows Media Player wmplayer
Windows Messenger msmsgs
Windows Picture Import Wizard (need camera connected) wiaacmgr
Windows System Security Tool syskey
Windows Update Launches wupdmgr
Windows Version (to show which version of windows) winver
Windows XP Tour Wizard tourstart
Wordpad write

-- A Black Hack: Post

Friday 11 September 2015

Highly Compressed Ankit Fadia Hacking Ebook Collection ( All in One )

Download Ankit Fadia Hacking Ebook Collection ( All in One )



Guys,Today I'm providing ankit fadia all hacking ebook collection for free download. I think you all know about Ankit Fadia,if not just Google it. He had created many ebooks on hacking and he is still creating. Download this all ebooks collection here.This ebook is very efficient to beginners' and advance learners.This ebook collection focuses on Hacking,security and programming so feel free and happy to learn from this ebook.


Review of the Ebook Collection !!!!









Download From Server 2:(Mediafire.com)

Password: www.blackohack.blogspot.com

--A Black Hack: Post


Wednesday 9 September 2015

ShkoShiko hacker AIO(Collection)+Bonus Tutorials

ShkoShiko hacker AIO
=================
hold in:
Antirus attacker v.3.0
AIO_phpbb2_tools
Back_door
BIOS pass remover
crimetime_2.0
cvv2_retriever
Davs2006
DeepUnFreezer
edit cookies mozillafx
FreeKiller
ftpd
hack Flash template
HAX tools
http_flooder-v3
IIS
intelmiX DOS email Attacker1
Internet_Download_Manager_5
IP_Forcer
IP_Hider_v2[1].7_-xray-
Liçensa & Pakoja e Windows Shqip
M41l-b0mb_2
MD5 Cracker
Messblack MSN Booter
MSN Cracker
MSN freezers:
Quote:
msnlocker
msn_locker_01
msn_freezer_ri
msn freezer
ent3r[x] ass
938595-MEssBlackFrezzerBeta
631375-HotFreeze 1.6
471905--50°CelsiusMSNFreezer
466870-XXLocker
msnfreezer

NetBioS
nolimitcracker
nukehack
PasswordStealer
Patch Makers AIO
phpBB-XSS
rapidshare_time_resetter
rapidshare_unlimiter
Resource Hacker
RFI scanners+dorks
root kits
Server_Killer
speedupPC Tutorial + BATCH
Sprut
Try2DDoS_Builder(español)
UdPflooder
Warez Sites
WebHacking_TooLz:

Apache Hacking TooLz
Remote File Inclusion And Remote Command Execution

Directory
Databases & SQL Injection & XSS TooLz Directory
PHP Shells

+ Bonus Tutorials
Size: 73 mb

Download (Server 1):

Download (Server 2):

-- A Black Hack: post

Tuesday 8 September 2015

The Best Hack Tools Collection Ever By Black Hack:-All Working Hack tools MegaPack

The Best Hack Tools Collection Ever

Clients
back orifice source
BackDoor v2.0
DeepThroat v3.1
Doraah War Engine v1.0b
Hack ‘a’ Tack v1.20
Http Bomber v1.001b
Kuang2 Client v0.21
NetBus v1.20
NetBus v1.70
NetBus v2.0b Pro
SchoolBus v1.85
Shadow Remote Administator & Control v1.04
Shadow Security Scanner v5.07
Shadow Security Scanner v5.21
SubSeven v2.1 Gold Edition
SubSeven v2.1
Vampire v1.2
WebCracker v4.0
WinCrash v2.0
wwwhack v1.913
——————

Security 
Anti-Keylogger v2.1
Anti-Trojan v5.5
Local Port Scanner v1.2.2
NeoTrace Pro v3.20
NeoWatch v2.4
PestPatrol v3.2
ProPort v2.0
Trojan remover v3.3.7
Trojans First Aid Kit v5.0
——————

Serial Software
Angus v3.0
Dragon v2.0
KeyGen Killer v1.1
NEO 2.0b
Octavius v2.1
Oscar 2000
Ripper v1.00
Serial-0-Matic v2.4
Serials 2000 Template file – Little Red Wagon
Serials 2000 v7.1 Crew 2001-9-16
Serials 2000 v7.2 BytE RippeR 2003-12-15
Tesla v1.4
——————

Chat
Blue Fire v2.5
——————

Mail Bomb
Anonymous Mail Bomber
Divine Intervention
Euthanasia v1.52
fmbomb
Homicide
KaBoom v3.0
Mail Bomber v8.1
Mail Fraud
mailbombv02b
MiSoSKiaN’s Fake Mail
Nemisis Mail Bomber v1.0
Poperganda v2.0
Quick Fyre
Saddamme v0.2
SMS Bomber v1.3
Unabomber
——————

Ping & Nukes
Pong v1.0
*****Slap v1.0
Click v1.4
Evil FTP Hacker
Evil Ping v0.3b
F-ed Up v2.0
Gimp
IgmpNuke v1.0
kod
LORNuke v2.0
Meliksah Nuke v2.5
Muerte v2.1
Nuke v2.3
Nuke’em v1.0
VZMNuker
WinNuke v95
——————

Keyboard Key Logger
KeyLog98
KeyTrap v1.0
——————

Java
appletkiller
attackthread
consume
hostile
nasirc
scapegoat
silentthreat
ungrateful
wasteful
——————

Port & IP Scaner
Angry IP Scanner v2.08
Ass Sniffer v1.0.1
Blues Port Scanner v5
IP Stealer Utilities
ITrace32 v2.00
Porter v1.2
SuperScan v2.06
——————

Credit Card Generator
CCard Number Generator
Credit Card Generator v1.0b
——————

Crash Hard Drive 
Crash Pentium 2
Hard Drive Killer Pro v4.0
Hard Drive Killer Pro v5.0b
——————

Password Recovery Tool 
Cain v1.51
LC3

Download Links:

 Download From Server 1

  Download From Server 2

-- A Black Hack: Post

Monday 7 September 2015

Download and Run Kali Linux on Android and other Devices

Kali Linux for ARM Processor or we can say it for Android devices is great out by Offensive-

Security.com. The new Kali Linux for ARM processors is the hacker best Operating System races in your

smart phone, what you want more then this. There is also a list of custom made Kali Linux versions like:

Raspberry Pi
Odroid
Cubox
Beaglebones
Chromebooks
and more coming soon but the great thing is the power of Kali Linux in your hands.
.
The Download for ARM version is here.
Kali Linux for ARM and Intel versions

The Download for Custom ARM and VMWare is here.
Kali Linux for custom ARM and VMWare

Here is the list of some tools available in Kali Linux

dnsdict6
dnsenum
dnsmap
dnsrecon
dnsrevenum6
dnstracer
dnswalk
fierce
maltego
nmap
urlcrazy
arping
cdpsnarf
detect-new-ip-6
detect-sniffer6
dmitry
dnmap-client
dnmap-server
fping
hping3
inverse_lookup6
miranda
ncat
netdiscover
nmap
passive_discovery6
thcping6
wol-e
xprobe2
dnmap-client
dnmap-server
netdiscover
nmap
dnmap-client
dnmap-server
miranda
sslscan
sslyze
tlssled
p0f
tcpflow
wireshark
bbqsql
dbpwaudit
hexorbase
mdb-export
mdb-parsecsv mdb-sql
mdb-tables
oscanner
sidguesser
sqldict
sqlmap
sqlninja
sqlsus
uzz_ip6
ohrwurm
powerfuzzer
sfuzz
siparmyknife
pike-generic_chunked
spike-generic_listen_tcp
spike-generic_send_tcp
wpscan
cadaver
davtest
deblaze
fimap
grabber
joomscan
nikto
padbuster
proxystrike
skipfish
sqlmap
vega
w3af
wapiti
webscarab
webshag-cli
webshaggui
websploit
wpscan
xsser
zaproxy
chntpw
cmospwd
crunch
dictstat
hashcat
hash-identifier
john
johnny
lsadump
maskgen
oclhashcat-lite
oclhashcat-plus
ophcrack
ophcrack-cli
policygen
pwdump
pyrit
rainbowcrack
rcracki_mt
rsmangler
samdump2
sipcrack
sucrack
truecrack
aireplay-ng
airmon-ng
airodump-ng
asl;eap
cowpatty
eapmd5pass
fern-wifi-cracker
genkeys
genpmk
giskismet
kismet
mdk3
wifiarp
wifidns
wifi-honey
wifiping
wifitap
wifite