Menu
Is free
registration
home  /  Problems/ Free hack how to use the program. WhatsApp Sniffer: a description of the program and how to protect yourself

Free hack how to use the program. WhatsApp Sniffer: a description of the program and how to protect yourself

February 06, 2013 09:57 am

Console loading speed from 5 seconds to two minutes
(this specificity of work is absolutely all chips reset glitch hack)
As for the speed of launching games, games are launched as with external drive and from the inside quickly and quietly.

File manager for freeboot

XexMenu is a simple shell for running games from any media, has a built-in file manager, allows you to run games and applications with * .xex extensions
Control buttons (rb, X - source selection dvd usb hdd, Y-output menu of operations on files copy past cut) The easiest way to launch games and applications for beginners.
How to use? Very simple.
We go on the console to the "game library" section and run (if it is not displayed in the game library, then select the demo version)

Also, XexMenu can be written to a memory card, USB flash drive or internal hdd. To do this, start the hechmenu from the disc, press X, select DVD and copy the C0DE9999 folder with all its contents to the content \ 0000000000000000 (16 zeros) pack of your HDD. That's all, now you can forget about the disc with the hekhmenu.

HOW TO RUN ISO from USB?
File system hard the disk should only be FAT 32 (to format, use acronis disk director)
Download the program Xbox image browser (link below)
Create a GAMES folder on your hard (or flash drive) (ALL WITH CAPITAL LETTERS)
Open the Xbox image browser ISO file with the game.
Create a folder with the name of your game in the GAMES folder.
Now right click "EXTRACT" and extract all files into the newly created folder with the name of the game on the USB drive.

After extracting the game, be sure to go to the external HDD into the game folder and delete the $ systemupdate folder

Now insert the USB into the xbox360. We go to the game room. Launch xexmenu. If you copied everything correctly, then the games will automatically appear in the xex menu.
Choose a game and press A. Enjoy your game!

XeXmenu shows a list of games with hard disk connected via usb

How to unlock arcades?

Downloading an arcade game from the Internet. Download the program YarisSwap (link below)
We launch the program. Select the game file (many numbers and letters). Click on the red button and wait. That's it, the file is patched. Then we take the patched file and paste it back into the folder where it was. Then we throw this folder on the internal hard (how to do it, read the bottom) in the section content \ 0000000000000000 \
That's it, we have a full version

How to copy games over the network:

XeXmenu shows the ip address for copying games over the network (it is the ftp server)

XeXmenu shows the temperature of the processor, memory and allows you to choose the cover to your liking

(game downloads go through total programs commander or FLASHFXP is better)

We connect the Xbox 360 to the computer by local network via FTP protocol

There are two ways to copy games over the network:

1) directly connect to the PC (you need to manually register the ip addresses)

2) connection via a router (the router will automatically do everything, provided that the DHCP service is configured on it)

Let's consider the first method in more detail:

directly connect to the PC (you need to manually register the ip addresses)

We connect the network ports of the computer and the xbox 360 with a patch cord cable. If this was not included in the kit, it is sold in any computer store.

Turn on xbox 360
- go to the system parameters
- network parameters
- configure the network
- tab basic settings
- choose manual mode ip-address parameters
- register the ip-address 192.168.0.2
- subnet mask 255.255.255.0
- we do not need the gateway, we prescribe 0.0.0.0
- save the settings by clicking done
- run the xex menu and leave it running
- go to the PC with Network Connections
- Local Area Connection Properties

Go to the properties "Internet Protocol TCP / IP"

We register the IP address and network mask

Click OK
- restart the PC
- launch Total Commander (you can use any other FTP client)
- press Ctrl + F
- select New Connection
- we register the ip-address of the xbox 360 ftp server and, separated by a colon, the port number - 192.168.0.2
- xbox login and xbox password

Click OK and connect using the created connection
- we now have access to all storage devices connected to the xbox360

Copy games to section HDD1 \ content \ 0000000000000000 \

Using iso2god, you can upload games over the local network we just created.

How to install games on Freeboot from iso image to the ORIGINAL hard drive over the network

Launch the Iso2God program (link below)

if the program starts with an error, disable your antivirus
when unpacking the archive, the antivirus swore at the xextool.exe program, but there is nothing dangerous in it.
- Click Add ISO

In Image Location, specify the path to the iso image
- In Output Location - the path to save the converted freeboot result

There are 3 items in the lower drop-down list:
- None - select if we do not need to reduce the size of the image
- Partial — the image is cut off after the end of the last used sector. Saves 800-1500 MB of hard disk space
- Full - complete rebuilding of the image with the removal of all empty sectors on it. You can leave the modified image for future use. We get the best-sized result. It takes 5-10 minutes additionally.
- select the settings we need and click Add Iso
- now convert

For example, the Saboteur game image has shrunk from 7.29 GB to 5.64 GB, with the Full image rebuild mode selected.
- now, the result obtained in the Output Location, I have this folder 4541088F - the name is unique for each game, we copy it to the hard disk in partition3 to the HDD1 / Content / 0000000000000000 / folder via the local network using the FTP protocol.
Do not forget that to copy the game over the network, it must be launched on the xbox 360 XEXMENU
(he acts as FTP client server)

Video codecs for watching movies - download

DLC (add-ons to games) and patching for games

As for the various DLCs, title updates - everything is simple.
We downloaded the DLC, for example for the batman, usually the DLC has a folder 000002. So, you need to drop this folder into the hdd \ Content \ 0000000000000000 \ 4500052 folder where 4500052 is a folder with a unique game number. Moreover, the game itself can be stored on USB Hdd, but the DLC for it must be on the console's HDD!

Now about the title update, they are TU, they are patches. Everything is also simple - we throw a unique file in hdd \ Cache (4L145C441000.000256 - example file) (no more manipulations are required)
We usually download the latest update.
Site with the latest title updates -

PC software:

YarisSwap
What for: unlocking arcades, avatar DLC (clothes of avatars).
Additionally: can upload content directly to ftp protocol to box, can change XUID.

Iso2God
Why: converts games from ISO to GOD container (Games on Demand).
Additionally: can upload content directly to the box via ftp protocol, can change the picture of the shortcut that will be visible in the dash, as well as the name of the game and description.

Xbox Image Browser
if the program starts with an error, disable your antivirus
Why: unpack ISO
Additionally: after unpacking, the game must be dropped into x: \ Games \ game name \ (suitable for both the hard drive of the box and for usb flash drives and hard). Launch the game with the default.xex file through the xexmenu program, or from the shortcut in the dash if you have previously created it in the Quickboot program.

Programs for Xbox360:

Xexmenu
What for: the main program for xbr consoles. Running games, emulators, other programs, as well as the file manager, shows the temperature of the iron. FTP server.
Additionally: to connect to xbox via ftp protocol, this program must be running on the console. It has two types: NXE container (drop into content \ 0000000000000000 \ C0DE9999 \ 00080000 \) - the shortcut will appear in the game library \ demo section of the game, and unpacked (run through default.xex).

NXE2GOD
Why: converts games installed from the disc into GOD games (you no longer need a disc to run).
Additionally: it also looks like an NXE container (drop it into content \ 0000000000000000 \ C0DE9999 \ 00080000 \) - the shortcut will appear in the game library \ demo section of the game, and unpacked (run through default.xex).

Update Reset glitch hack (new freebie) to new dashboard 16197

INTERNET EXPLORER appeared in the new update 16197

Now you can walk around the Internet, view the latest entries on the wall in Vkontakte immediately on the XBox 360 game console

  1. Remember that by setting yourself third party application, you yourself are responsible for the consequences!
  2. Reading someone else's correspondence, you violate his rights, and for this criminal liability is provided!
  3. This instruction only provides information on how attackers read someone else's correspondence, but in no case calls you to do this.

What is a sniffer? In thieves' jargon, these words mean a person who can open the safe with anything, even the most rusty pin. Let's figure out what an application like WhatsApp Sniffer is for, for a computer and a phone, which, by the way, can be downloaded from our website.

Why do you need

This utility was created in special secret laboratories in America - at least that's what the developers say. With the help of a sniffer, you can easily hack any account in Votsap and get access to all the secrets of the correspondence of the desired person. Of course, you download the program at your own peril and risk, no one is responsible for its bugs and other possible unpleasant moments.

So, according to the developers, the sniffer allows you to:

  • completely take over the accounts of the "victim", as if it were your personal account in Wotsap;
  • read all user messages;
  • send messages to the user's friends on his behalf;
  • change the photo on the avatar;
  • change status;
  • send files and receive them.

How does it work

The utility works only on Android. The developers also assure us that this application is completely safe for your phone.

So, the essence of the sniffer's work is as follows: each phone has its own original MAC-code, which the utility copies and, thus, the program thinks that it was entered from a familiar smartphone or another gadget. The sniffer can copy the MAC code in three ways:

  • SMS. Send a special SMS to the victim with a link. When the victim opens the link, the sniffer will penetrate the phone and the user's WhatsApp program, opening access for you.
  • Call. The application calls the victim's phone and when she answers it penetrates the phone and the application.
  • Wi-Fi. If you are next to the victim, and you use the same Wi-Fi with her, then you just need to launch a sniffer on your phone and indicate the victim's number: in a second, you will have access to her WhatsApp.

To use the sniffer, just start the utility, select the method of use and press "spoof" - the button that allows you to detect the phone of the person you are interested in.

Where to download and how to install

To download WhatsApp Sniffer for Android you need to type in Google: "whatsapp sniffer apk download", or use the installation file that you can find on our website. Unfortunately, Whatsapp sniffer cannot be downloaded for iphone, because for this operating system it simply does not exist.

To install the utility on your phone, follow these steps:

  1. Hand over setup file to your smartphone.
  2. Launch it - it will install normally.
  3. When opening the file, it will ask for permission to access some functions, select "Allow". That's it: the sniffer is installed on your gadget.

If you cannot install Sniffer, then it is recommended to hack it for which you need to download WhatsApp Hach Sniffer for free in Russian.

How to keep yourself safe from WhatsApp Sniffer

What if you are not a spy, but a victim? If you have the slightest suspicion that your phone is being used by intruders for their own ends, you should uninstall the Wotsap application and reinstall it. Moreover, it is recommended:

  • Clean your phone with any antivirus;
  • Contact the Wotsap developers so that they put more serious protection against penetration third-party programs into the utility.
  • Always check how reliable the Wi-Fi network you are using is. So, if you have any suspicions that hackers may be connected to it, then it is better not to connect to it.

Top hacker software

Hidden from guests

Has a number of features that can help penetration testers and hackers. Two compatible applications used in this tool include "Burp Suite Spider", which can list and map different pages and parameters of a website by examining a cookie. Initiates a connection to these web applications, as well as "Intruder", which performs a series of automated attacks against targeted web applications.

Burp Suite is an excellent web hacking tool that many penetration testers can use to test the vulnerability of websites and target web applications. Burp Suite works using detailed knowledge of the application, which has been removed from the target HTTP protocol... The tool works through an algorithm that is customizable and can generate a malicious attacker HTTP request which hackers often use. Burp Suite is particularly useful for detecting and identifying vulnerabilities for SQL injection and cross-site scripting (a).

Hidden from guests

Also known as "ipscan" is freely available network scanner for a hack that is both fast and easy to use. The main purpose of this hacking tool for scanning IP addresses and ports is to find open doors and ports in other people's systems. It is worth noting that Angry IP Scanner also has a bunch of other ways to hack you just need to know how to use it. Common users of this hacking tool are network administrators and system engineers.

Hidden from guests

is an amazing network hacking tool that can be configured in one of three preset modes:
  1. it can be used as an interceptor
  2. package recorder
  3. for network intrusion detection
More often, hackers use Sniffer Mode, it gives them the ability to read network packets and display them on graphical interface user. In packet logger mode, Snort will audit and log packets to disk. In intrusion detection mode, Snort monitors network traffic and analyzes it with a user-defined set of rules.

THC Hydra - Often seen as another password cracker. THC Hydra is extremely popular and has a very active and experienced development team. Essentially Hydra is fast and stable for cracking logins and passwords. She uses dictionary and brute force attacks to try different combinations of usernames and passwords on the login page. This hacking tool supports a wide variety of protocols including Mail (POP3, IMAP, etc.), databases, LDAP, SMB, VNC, and SSH.

Wapiti has a very dedicated following. As a Penetration Testing Tool (or Framework), Wapiti is capable of scanning and identifying hundreds of potential vulnerabilities. Essentially, this multipurpose hacking tool can check the security of web applications by running a black box system. That is, she does not study source applications, and scans the HTML pages of the application, scripts and forms, where she can cram her data.

Today it is the top hacker software. Do you have information fresher than ours?- Share it in the comments. Have questions?- ask. We will always answer and explain everything.

Disclaimer: All of the following is written solely for educational and research purposes, as well as understanding the mechanisms of protection against hacking. The author in no way recommends using this information for hacking programs.

In this article, I want to talk about three and a half main ways of hacking .NET programs, the goal that I am pursuing is to help developers better understand the protection mechanisms of their programs, i.e. find out the most obvious threats and take appropriate action (or not take).

I will not go into details and use sophisticated hacking tools. Everything will be scheduled "for dummies", i.e. all tools will be simple, readily available, and free. And the main decompiler of programs for .NET

As a guinea pig, I chose the analyzer regular expressions. This program free, the license does not seem to indicate anything about hacking, but without registration it will work for only 60 days. In other words, the harm from hacking this program is minimal, besides, its internal structure is very well suited for training. I hope that the author of this program will not be offended by me.

This is something like an assembler, only very smart and has very powerful instructions. And this, in principle, is the same equal language as C #, only the syntax is worse (and more possibilities). In addition, metadata is actively used in a .NET program, i.e. all information about classes, method, properties, attributes and everything else is stored in the executable file.
Those. in fact, decompilation of a program is not a very correct concept in this case. She is already all in open form lies, and tools in the form of Reflector "and are engaged in converting MSIL constructs to the corresponding constructs in C # or another language, increasing the readability of the code.

Let's move on to hacking.

0. Resetting the trial

Actually, this is not even a hack, but a semi-legal way to extend the life of an unactivated program. It consists in the fact that there is a place where the date of the first launch is stored and changed / destroyed. After that, you can use the program until the next time.

Let's look at our experimental with a reflector:
After a little walk through the code, we find an interesting line in the MainForm constructor

Open the registry editor, go to HKEY_CURRENT_USER \ Software \ Ultrapico \ Expresso and see the following keys:

We delete them and get another 60 days of work.

This option, of course, is simple and obvious, but even if it were more complicated, it would take a little more time in the reflector to find out all the places where the information is written and clean them up.

Advice to developers who will try to write data to a secret place: write carefully, otherwise everything can turn into problems ordinary users, which for some reason will not have this place, or will not have enough rights to it.

1. Writing keygen "a

The worst option for a developer, and the most enjoyable for the evil end user. The program considers itself licensed, no scary gestures need to be done.

We open the reflector and look for the code for the classes containing the License or Registration, we see:

When you enter a name and a code by name, a certain hash is calculated, which is compared with the code.

This hash uses DES and all sorts of prefixes

Bytes are converted to a string using this method.

Now everything has cleared up, open the IDE and copy all the necessary pieces of code (or implement it ourselves). It remains only to find out what the values ​​of Prefix, Suffix and MyDES implementation parameters are. I will not give them, these are technical details.

As a result, we generate a key for any name and see:

Bingo!

Protection against keygens is simple and obvious: use asymmetric encryption in some form. Those. to make it impossible to generate the code without knowing the private key, and this key is in only one place - with the author of the program.

2. Using a wrapper

Checking the correctness of the license is quite troublesome and slow. Therefore, software developers usually check the license once, and then use the resulting flag - valid / invalid (as an option, how valid is it, if several types of licenses with different capabilities are allowed). Here you can play on this using the following algorithm:

  1. Tell the program that the license has already been verified
  2. Tell the program that the license is correct
How to do it? I already mentioned having metadata in executable files at the beginning, we will use this. Let's see how the program starts and how the license is checked:

There is nothing interesting with the launch, but the check shows that if the program is already registered, then it believes that everything is fine and does not further work to find out the correctness of the license.

Let's take advantage of this:
Let's make new project, add Reference to Expresso.exe and run it through ourselves:

Let's see what happened:

Well, who would have doubted.

In this case, everything turned out to be simple, but if the author of the program had replaced the public properties with private ones, then he would only have to use Reflection for access and everything would have been reduced to the original task.

I think it is clear how you can try to protect yourself from this - check the license periodically, look at the environment from which the program is running, make it impossible to set the desired variable.

But all these protections will lead to the fact that the attacker will use

3. Physical hacking of the program

Everything is already serious here. The entire program is decompiled in MSIL, and from it it is already assembled back (remember, I wrote that MSIL is the same language as C #?). For decompilation, we need a utility from the SDK called ildasm and for compilation the compiler from .NET Framework ilasm.

Run ildasm, open Expresso.exe and save the dump to an .il file. We find the already considered IsRegistered method and add a little of our code (without labels):

Then we take ilasm and put everything back together (not forgetting to connect the resources).

What is he doing given code: sets the desired name for registration (optional), and returns the status that everything is fine.
To make it clearer, this is how it looks in the reflector, in C #

Those. it is quite obvious that now everything will be fine:

A little about the code in MSIL: this is a stack machine that has no registers, all operations have the form: push the required number of parameters onto the stack, execute a function that will take the required number of parameters and put the result. Well, and vice versa: set the value of a variable to what is on the stack. To better understand how all this works, I recommend a simple technique: write a small program in a familiar language, compile, see what happened in MSILe and understand the constructions of the language.
At the same time, some things in MSIL can be done very nicely, for example, swap two variables in places - 4 nice lines (less in C #, but ugly).

What the attacker sacrifices: the signature of the program, now it is no longer the author, but his. In some cases, this is a problem if the program uses many libraries. Then the evil hacker will have to disassemble them all and reassemble them, but if he copes with this, then he will have his "own" version of the program signed his key.

There is actually little protection against all this disgrace: to carry out obfuscation or to carry out part of the logic / protection check into the native code.

Conclusion

I think I told how easy everything can be broken in .NET, if the creator has not made an effort to protect his program. And you really decide whether to make protection and spend time and resources on it. Or maybe just make a web-system, or a free limited version. It's up to the developers.