Monday, December 21, 2009

Also on Opera!

For those with opera accounts, I'm also on opera as kalgecin and bloging there also. my.opera.com/kalgecin/blog. Feel free to add me as a friend

Tuesday, December 15, 2009

The power of crack.pl[.rb]

I've generated 5GB of rainbowtables with crack.pl and set to work. Visited md5decrypter.co.uk and downloaded their uncracked hashes(over 100K!) opened msfconsole loaded crack plugin and started to lookup the hashes. After 6 minutes, it looked up all the 100K hashes and cracked about 23% !!
One of the powers of the crack.pl framework is the ability to create rainbow tables from the wordlist, no other rainbow table cracker  does this (correct me if i'm wrong) and the lookup of a hash is instant! almost no delay!
enjoy your holidays ;)

Friday, December 11, 2009

Crack.rb

Hi guys,
as promised, i've added something new to the crack.pl project. I've added a Metasploit plugin! just copy the crack.rb file into your metasploit plugin folder and load it! you can use your existing tables folder with the metasploit plugin

# sudo mount --bind /path/to/crack.pl/tables /metasploit/data/crack.rb/tables

This will bind your existing tables to the metasploit directory!
The plugin is in the svn repository

Wednesday, December 9, 2009

Finally Holidays !

Finally that i have holidays and the stress of exams is off, i'll continue to develop crack.pl and maybe metascanner .
P.S. 81MB of crack.pl rainbowtables contains over 6 Million passwords!! beat that. Lookup is instant!
code.google.com/p/kalgecin
ENJOY!!

Monday, October 5, 2009

Created a forum

I have just created a new forum on my site!
The forum is welcome to suggestions and the rules & topics will be added along
http://kalgecin.110mb.com/forums/

Saturday, October 3, 2009

Crack_V3 released!!

Hi guys,
I'm proud to release the 3rd version of crack.pl. The biggest of the added features is
Almost instant rainbow table lookup(sample tables ziped with the 3rd version).I will continue working with the svn. A planned feature is to make an online script that will interact with my(or any other pc) to crack the hash from anywhere. I've come to this idea as i had obtained a hash but didn't have access to my pc :( but only to my mobile that has internet. I'll see what i can do. You can download the 3rd version from code.google.com/p/kalgecin

Monday, September 28, 2009

crack.pl version 3 to come out this week.

the next version of crack.pl is planned for this week.
it was supposed to be released this saturday, but due to bugs being found it's postponed to sometime this week(probably saturday). but please check out the latest svn at code.google.com/p/kalgecin/ to test the latest version.
most changes are increase in speed and reduced in rainbow table size.
please report any bugs through issues tab on google code.

Monday, August 31, 2009

A faster way to crack hashes with a rainbow table

Hi everybody, it's been a long and busy time. however i still found some time to develop crack.pl to this wonderfull extent. Here's the situation:
I have a 20GB table and 120,000 hashes in a file. To parse all those hashes through the table used to take about one week 24/7. Now however it takes only 10 mins at most!! To generate a table i downloaded mil-dic and created a stat file in john then used the markov to generate a 12GB wordlist. Then used crack.pl to generate the 20GB table. Split the table into a lot of pices and lookup through the pices.
The advantage?
I know which part of the table to search! not the whole table like it used to :)
The tool can be downloaded from code.google.com/p/kalgecin

Friday, August 7, 2009

Crack.pl V2 released

I am proud to anounce that crack.pl v2 is out and can be downloaded from http://code.google.com/p/kalgecin.
I hope to introduce NT and NTLM cracking in later versions
Enjoy

Thursday, July 16, 2009

NMAP 5.00 Released!!!!!!

Well this is the biggest release since what 2007? Here's what's on their site:

July 16, 2009 -- Insecure.Org is pleased to announce the immediate, free availability of the Nmap Security Scanner version 5.00 from http://nmap.org/. This is the first stable release since 4.76 (last September), and the first major release since the 4.50 release in 2007. Dozens of development releases led up to this.

Considering all the changes, we consider this the most important Nmap release since 1997, and we recommend that all current users upgrade.

Well what are you waiting for? Go get a copy! :)

Thursday, July 9, 2009

Now on code.google.com

Hi guys, just thought of posting this.
I've created a google code page where i'll be posting my public projects. The page is at
http://code.google.com/p/kalgecin

Sunday, June 28, 2009

Cracking PSK

Just thought of posting a quick tip and way on cracking WPA/PSK passwords.

airodump-ng --channel 11 --bssid 00:14:BF:A9:F7:E7 -w ~/linksys

this will start to capture packets. We only need ONE handshake! look at the data# tab and after it reaches around 200kb you can safly abort.You don't need to be associated with any network. Next you crack with aircrack-ng

aircrack -w /pentest/paswords/jrt/passlist ~/linksys*

That's it you will wait for the password to be cracked. Then you'll be able to log into that network

Thursday, June 25, 2009

crack.pl released

I'm happy to release crack.pl which is a perl script designed for linux to crack md5 and sha1 pass words. Hopefully i'll add more stuff like ntlm and lm support but for now it's just md5 and sha1. You can download it from "http://kalgecin.110mb.com/index.php?id=codes".
It can be used with a dictionary or brute force where it will try from a to zzzzzzzz. bruteforce is a very slow process and take very long time for passwords longer than 5 characters.This script can also be used to generate a "rainbow table" which has a form of "hash : password". This tables take a lot of space and you will have to use "sort -u -o " to remove any duplicates.
For any feedback please leave a comment or email me at kalgecin@gmail.com
Hope you will enjoy this script.

Monday, June 22, 2009

I'M BACK!

sorry for those who have been waiting for me to post something. i've been busy with the exams and had to put my mischief asside :)
any way i'm through. and currently making an md5/sha1 cracking script in perl. i'll post it to my site(kalgecin.110mb.com) soon. i'll post here as soon as i do. please if you have any suggestions. comment them or email me at kalgecin@gmail.com.
currently it may be used with a dictionary or bruteforce.
best of lack to all.

Saturday, May 2, 2009

added tips to my site.

i've added some tips on computer security on my site. feel free to look it up. its still under construction as i'm learning php but take a look anyway.

Thursday, April 30, 2009

New Site!

Hi guys,
Scince the crash or 110mb.com's box no 16, Some of the data on my homepage has been deleted. I'm currently making one from the scratch using php.
It is available at http://kalgecin.110mb.com. Be sure to visit.Although it contains very little info, i'd appreciate if you would contribute as to what to add to my site:)
Wish you all the best

Monday, April 27, 2009

Site is back!

It appears that the 110mb.com have managed to fix the problems that they had with their server.
Happy hacking guys :)

Saturday, April 25, 2009

Home page down!

It appears that the server on which my site is hosted at 110mb.com is down. and so is my site. I just hope that my pages are intact because i'll have to rebuild the whole site!

Bypassing filters with metasploit

hi to all those who are following this blog
sometimes when exploiting a hole in a webpage eg. php. the exploit fails because of a filter.The filter may be filtering all non-printable characters(which is quite often).
to bypass the filter, you can "encode" the payload. ie. just before issuing "exploit" type
set ENCODE
where encoder is one of the compatible encodess. to see these, type
show encoders

good luck!!

Using Metasploit

to use the metasploit framework, all you have to do is type a few lines of instaructions. I won't be spoonfeeding anyone so i'll just put some "generic" examples. I'll be using zenwalk version of linux.
open a console and type "./msfconsole"
next, after the console is loaded type "search " where '' is your search criteria. Decide which exploit you are going to use and type "use ".Next type "show payloads". This will show all the compatiable payloads for the framework. Pick one and type "set PAYLOAD ". Next set all the required options listed in "show options". To so type "set ". When your are done, all you have to do is type "exploit" and the framework will launch an exploit against the specified target. If all goes well, you will have a working session. To view the session type "sessions" and you will find a session there type "sessions -i " where '' is the session number. And VOILLA! you are inside the computer!

Tuesday, April 7, 2009

password cracking 5

the admin was very surprised and the admins asked me how i did it. i did point out that the greatest of their weaknesses were that they left the computers without signing out, weak password choosing and depending too much on the ready made tools out of the box. from that day on they hired some penetration testers to audit the school network.
this is just but one real life example on how most of the admins are ignorant, dependent on tools and lazy.
stay safe and don't depend on the programs out of the box.

Sunday, April 5, 2009

password cracking 4

yeah i was ready for that. next i opened the cmd and typed the path to the other copy. within seconds, i had the hashed passwords on my flash. when i reached home, i launched 'john the ripper' to crack the passwords. with the dictionary from milw0rm that was used to generate the markov file, and john's magnificent rules, i cracked all the passwords within 72 minutes. the next day i went to school and was able to login as an admin. i sent an email from the admin address to the head and all other admin staff.

Saturday, April 4, 2009

password cracking 3

so i downloaded a copy of fgdump at home and saved two copies in different folders. the next day i went to school and was eager to find an unattended admin logged in. i saw one of the admins at a computer and told a any to tell him that the headmaster was calling him. the admin woke up and left. i had at most 5 mins to complete my plan. i inserted the flash and opened the folder containing one of the fgdump copy. the copy got automatically deleted and a virus warning issued.
more on the next blog :)

Friday, April 3, 2009

password cracking 2

next i wanted to know their network structure and if they are monitoring the students activities. went to whatismyip.com and took down the ip. the ip directed to a proxy, meaning that there is a high probability that all the traffic is filtered and logged. i went home and used nmap to scan the whole subnet to get an overview of the structure. the wonderfull zenmap have me a graffical view of the network structure. all the network was directed to a proxy then to a firewall.

stay tuned for the next blog :)

Tuesday, March 31, 2009

password cracking

PLEASE NOTE:
password cracking is an elegal activity if done without permission. do not point fingers at me if you are doing it without permission

a few weeks ago, i decided to test how well have the admins at my school protected the systems. i walked up to the headmasters office and told him of what i intended to do. he told me he'll talk to the admins and let me know of what they think. the next day, he told me that the admins were ok and have me a WRITTEN permission to sign.

more in the next blog!

Sunday, March 29, 2009

the link

here's the link to the article of the previous post. read it and comment out what you think is bad. please consider in mind that most of this is just lies.
http:\\www.adequery.org/stories/2001.12.2.42056.2147.html

Friday, March 27, 2009

importance of public knowledge on hackers

some people get the false impersion on hackers mainly from other sites that deliver false contents.
for example. recently i read an article written by someone on how to determine if your son is a hacker.
honestly, i don't think this guy even bothered to open google and type the word hacker! for example, he mentioned that "lunix" is an elegal operating system and that telnet is a software used to hack other servers in a flash!
i was very shocked when i read this article. i'll be posting the link soon.

Tuesday, March 10, 2009

a source code review.

hi guys. i know i haven't bloged for a long time now. i've started schooling after a very long holiday, however my mom is not pleased with my report :) so my computer time is limited.
i've been making plans to create/develop a source code auditor. i'm still researching and learning. either i'll create my own or find an unmaintained one. i've particularly noticed the flawfinder hasn't been treated for a very long time, i'll probably fork off or ask the author to hand over the project to me.

Wednesday, February 11, 2009

MetaScanner V1.2

Hi guys!,
Yet another version released purely thanks to those who submitted the outputs and suggestions. This release is a complete rewrite of the project. Now MetaScanner uses the xml output provided by nmap and so has a lot of false positives reduced. However as this is  a rewrite, I expect to see a lot of bugs that i have not fixed. Please submit any incorrect results together with out.xml to kalgecin@gmail.com

Monday, February 9, 2009

Fixed bugs

Thanks for the people who submitted their outputs and those who reported bugs! I've managed to fix all the bugs and post the new updated MetaScanner to my site! Please continue to submit your outputs and/or errors to kalgecin@gmail.com

Wednesday, February 4, 2009

MetaScanner V1.1

The slightly updated version of MetaScanner now scans the database every time it's started! Hmmm.... no wories you won't have to wait some 15 mins for every host you scan! The new improoved scanning take only about 2secs at most! Get you copy of the tool on my site!

A comet is on it's way!

Ever wanted to see a comet ? well here's you chance! comet Lulin is on it's way into the solar system for the first time in it's life! and a wonder full color too! It's glowing green and it will be the closest to earth on the 24th of Feb.! Don't you miss it

Tuesday, February 3, 2009

A better meta_scan.rb

Good news to those who are waiting  for a better and faster way of parsing the Metasploit database for the MetaScanner. Well wait no more visit My Site for the latest meta_scan.rb. This script scans all of the modules and creates the database within 5 seconds! Please comment and give suggestions to kalgecin@gmail.com

Sunday, February 1, 2009

MetaScanner v1.1 Released!

After a hard work making the beta version and examining all the reports that you people have submitted (thank you very much)  i am happy to announce the release of a final 1.1 version of MetaScanner. Please visit my site at http://kalgecin.110mb.com for a download and a user guide.

Friday, January 30, 2009

MetsScanBeta2 released!

Hi to you all!
I am proud to release the beta 2 version of MetaScanner!
I have fixed some bugs and less false positives!
All thanks goes to all those who have submitted their results and i beg others to continue because without your support this little project of mine would be of no use :)
To obtain my new beta2 version visit My site

Thursday, January 29, 2009

Using MetaScanBeta.rb

I can't yet make it a full 1.1 release as there is still much work and testing to do(please help) i've been asked questions on how to use the MetaScaner. most peple report something like database2.db not found. here are the steps to get the MetaScanner running
1. open a scan_meta.rb and edit the variable "scan" to point to your framework location
2. open a shell and type
     #> ruby scan_meta.rb

3. wait for the database scan to complete. Depending on your machine speed it may take up to 10 mins

4. type
     #>ruby MetaScanBeta.rb
5. enter the target and the rest is clear


Please mail me (kalgecin@gmail.com) on any errors

Wednesday, January 28, 2009

An update to scan_meta.rb

I finally managed to make the scan_meta.rb do multitasking. This is a great advancement as it runs almost twice faster! I've uploaded it to my site for you guys to enjoy

Tuesday, January 27, 2009

MetaScan V1.1 beta!

Well in this version i modified meta_scan.rb to include the OS details. so that MetaScanBeta.rb can parse through those details to match the OS. This greatly minimizes the false positives but unfortunatly i don't have any service vulnerable to metasploit as such cannot test the script myself(although i scan my lan/wan in hope to find one vulnerable) I need you help guys in testing the tool. Please mail me or leve a comment on this blog on how the test goes so that i can patch up the bugs (patches are also welcome and credit will be given). I uploaded the beta script to my site

Monday, January 26, 2009

Moved to a new site!

Today i decided to move my site to a new host since the previous(kalgecin.b0x.com) did not allow me to upload most of my scripts. My new site is here and is up-to-date most of the time. Please add any suggestion and/or comments.About the MetaScanner:
It's a vulnerability scanner that depends on nmap. It parses the output of nmap to see the port, service, version and the like. It later uses this information to parse the database for vulnerabilities of the affected versions. Although this scanner produces a lot of false positives, it's a quick and easy way to scan your target and get filtered to a few metasploit framework exploits. The MetaScanner also has a script to scan the metasploit database for the vulnerabilities. It scans the "Name" part of exploit and stores it in the database.
Please feel free to use any of my scripts at my new site kalgecin.110mb.com

Saturday, January 24, 2009

MetaScanner V1.0

Today i fully completed my MetaScanner a scanner to detect a host with metasploit compatiable exploits :) it was a difficult task but i managed. I'll hopefully release it on my website soon, so styan tuned for updates.

Friday, January 23, 2009

The Wonderfull day!

Today i descided to learn ruby! well learn't most of it. Ok so my aim was to make a small vulnerabillity scanner of my own and i fugured out that ruby is way to go. The best news is that it's ready and working with one exception :( i don't have a vulnerabillity database yet so you guys will have to wait to use it. You can always join me and help me in this project, just drop me an email to kalgecin[at]gmail[dot]com

Wednesday, January 21, 2009

Life on mars?

Nasa has detected methane gas in the martian atmosphere! Methane would be almost immediately because of it's thin atmosphere through which the harmfull radiations from the sun enter. yet the methane gas is there! Which means it has to be constantly replaced! Well don't get your hope on finding aliens there because the gas maybe produced by geological means too. Scientists susspect that martian life is beneath the soil away from the harmfull radiations read more on

Just Joined

Hi guy's i just joined the bloging :) !.
I belive more about myself is in order ...

My name is Michael Kitange a.k.a The Kalgecin.I'm interested in programing, pentesting and computers in general. I've recently created a rocket simulation program in java. No it's not the kind that displays wonderfull graphics just plain text :) I also wrote a paper on buffer overflows hope
Hope you'll enjoy using and reading my stuff :)