Pages

Subscribe:

Ads 468x60px

Labels

Translate

Sunday, August 12, 2012

Save your Facebook Account


                                           Are you among the people who when opens web-pages usually ends on facebook or a person who is facebook fan who can’t stay away from facebook. If answer to any of the above question is yes then surely you might be knowing your password might be under attack. Since facebook is one the biggest social networks reaching millions of people around globe and contains private profiles and information it has become a hardcore target for hackers. Reason, it reaches thousands of people so if a fraud is conducted millions can be fooled, next the profile can be used for social engineering attack against you or setup false accusations. From long time I found sites are discussing on how to hack facebook password, but here I want to tell you how to save your account from being hacked by someone. Since there are

Save Your Facebook Account-2


I hope you are back to know how you can save your facebook account from getting hacked. This time we will discus how you can protect your facebook accounts from password breaking tools. If you want to know about various facebook password hacking tools please read,


As a hacker you’ll find that there are many other tools that I have not compared in “Facebook Hacking Tools Compared”. The reason is quite simple I haven’t found them for download, following is list of tools I haven’t found yet,

Facebook Private Viewer 2.4
Facebook Private Viewer 2010
Captcha Killer

Facebook Hacking Tools Compared

I don’t know why but people really getting mad behind facebook cracking softwares. Most of those softwares that claim to break into facebook are just fake pieces of code. The day I posted “Facebook Vs Facebooz” it got so many hits that made me write this another part to facebook hacking tool. Here we will cover some other facebook hacking tools other than facebooz, if you want to read about facebooz please visit this article “Facebook Vs Facebooz”. Here we will compare some other tools than facebooz.

1. Hell And High Water Facebook Cracker:

What Is Phishing


Here in this post we will discus a little about what is phishing. Please note what we are covering here is just basics and not a phishing tutorial. In phishing attack, an attacker creates a fake login page of a legitimate website and lures victim to login using it. The site under attack is known as phished site and the fake login page used for capturing or stealing information is known as phished page. To perform phishing attack an attacker performs following steps,

Facebook Vs Facebooz(face book hack)


                                             In year 2008 a tool was released for facebook hacking the tool is known as facebooz(also known as facebook freezer). A lot had been discussed whether the tool is really capable of hacking facebook passwords. Many think its just a joke that a tool can crack facebook passwords. So keeping unnecessary things behind lets try to find out why this works or if it not works they why. The tool is specially targeted to m.facebook.com, yes that’s the mobile version of facebook. By the way facebook claims that the vulnerability is patched but still the tool has been downloaded millions of times from its release that means the claim is just a false excuse. I created a fake facebook account with password “Monkey” and facebooz got no issues cracking it that means the tool works. Then i changed password to “M0n7e1” and the tool failed to guess it that means it failed to work. The thing which can depress you is its speed of operation, by the way it happens due to need of software needing re-authentication grabbing so you need patience.

How To Hack Facebook Account | Phishing


In this tutorial we will discus how you can hack Facbook account password by phishing. Phishing is act of creating a replica of legitimate website for stealing passwords and credit card numbers etc. Here I will show you how you can create replica of facebook log-in page and then fool your victim to put his username and password in it so that you can get his account password
.
First of all open www.facebook.com in your web browser, from

Hack Gmail Account | Phishing


In this following tutorial to phishing I‘ll demonstrate how to hack Gmail account password by phishing. Since we already covered how to hack Facebook account using phishing I consider this as second tutorial to phishing. First of all we will create a fake login page, to create it open www.gmail.com in your web browser, click on file then save as and selectfile name “Gmail” and save as type “Web page Complete”. After above process you’ll have a file named Gmail.htm and a folder named Gmail_files in folder in which you’ll save web page. Now open Gmail.htm in notepad, find for action word and locate following string,


BEST OPERATING SYSTEM FOR HACKERS


Today i will share with you which operating system i use for hacking activities. My favorite operating system is Backtrack Linux and Windows XP not because they are easier to use but because i love their vast functionality and features. But you can also give a try to Matriux Operating System and knoppix , Matriux OS is just awesome but its still under construction as designers are still working on it and patching it. Now lets discuss more about functionality of Backtrack operating system. I will not discuss more about windows XP because its so easy to understand that it needs no explanation.      
   


Best Operating System : Backtrack Linux
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch s

Sunday, August 5, 2012

Havij SQL Injection

Collection of SQL Injection Tools for website hacking.....

Havij SQL Injection


Havij is an automated SQL Injection tool that helps penetration testers to find and exploitSQL Injection vulnerabilities on a web page.The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

website hacking sql injection

For more information and download visit here

How to Use ardamax Keylogger For Hacking..


How to Use ardamax Keylogger For Hacking..just watch this tutorial..








Saturday, August 4, 2012

Change your Processor's Name Xp/win7

Are you bored with your old processor? Do you want a new processor with a breath-stopping name but are not going to upgrade any time soon? No need to worry. You can still have that new processor's name displayed in your computer. Well not only that, you can also have a better one than the one you are supposing to buy. Just follow this trick.

With this trick, you can change the name of your processor to a personalized one like My Processor or something extreme like Decacore Processor 50 GHz .  These are just a few examples. You can change the name of your processor to anything you like.
To have one such cool processor's name displayed in your computer, follow these steps:-
  1. Click on Start.
  2. Click on Run.
  3. Type "regedit" without quotes.
  4. Navigate to HKEY_LOCAL_MACHINE/HARDWARE/
  5. From HARDWARE, navigate to DESCRIPTION/System/CentralProcessor/.
  6. In the work area, double click on ProcessorNameString, and change its value according to your choice.
  7. Click OK
Win7

take Clear screen shots


Fraps...u cn take Clear screen shots..this for gamers ..
Hear it media fire

HACK WEBSITES DATABASE USING XPATH INJECTION




Everyday many website gets hacked by hackers but most of the hackers are hacking those website just for popularity nothing else. Today i am writing this tutorial on XPath Injection, in which i will explain you, How Hackers Hack Website Using XPath Injection.

In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database. The application queries the server and accesses the information based on the user input.

SQL INJECTION ATTACKS



What is SQL Injection?

SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. Web pages which accepts parameters from user, and make SQL query to the database, are targeted. For Example, A web page with username and password, fires SQL query on the database to check whether a user has entered valid name and/or password or not. With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else.

Monday, July 30, 2012

Hacking Gmail


Download PDF From Mediafire

Saturday, July 28, 2012

Most Popular Hackers Of All Time


I mentioned few most popular Hackers in this article. This article contains a combination of both “White and Black Hat” Hackers. Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. “Hack” may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem, such as a “kludge”.




The terms “hack” and “hacking” are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as by circuit bending. It is from this usage that the term “hacking” is often used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime (via Wiki).

How to hack wifi password?

Learn how you can easily hack a wifi password.
This includes for WEP, WPA, WPA2, WPS encryption.
You can do it from Windows7 or Mac OS X.
With Portable Penetrator you can easily recover WEP WPA WPA2 WPS wifi password.
Learn to secure your wifi so it dont get hacked.
Portable Penetrator Interface  

You Are Losing the Battle With Hackers. Yes, You.


You Have Been Hacked
“We’re not winning. … I don’t see how we ever come out of this without changes in technology or changes in behavior, because with the status quo, it’s an unsustainable model. Unsustainable in that you never get ahead, never become secure, never have a reasonable expectation of privacy or security.”
That’s a quote from Shawn Henry, the FBI’s top cyber cop who has spent two decades with the bureau, from a recent interview with the Wall Street Journal. And he’s not alone in thinking that there needs to be fairly substantial changes to software and network security.
James A. Lewis, a senior fellow on cybersecurity at the Center for Strategic and International Studies, said that as gloomy as Mr. Henry’s assessment may sound, “I am actually

Web Hacking Attacks and Deffense.pdf

Download PDF From Mediafire

Hack email accounts or passwords using session cookies

:D

Hi friends,Today i will show you the practical implementation of session hijacking that how can we take over others sessions and hack his email accounts and other website passwords. In this tutorial of hacking email accounts using session cookies, i will explain you with the help of yahoo account. I will tell you how to hack yahoo account using session cookies.

What are Session Cookies or Magic Cookie or Session ID?
Lets discuss this in very simple language, Whenever we login in our account, it generates a unique string that contains the path of automatic login for particular time then after that limited time it expires by itself.

Thursday, July 26, 2012

A BEGINNERS GUIDE TO ETHICAL HACKING

Apart from Hacking stuff, this book will also teach you the security aspect and after that you don’t have to worry about being hacked by other hackers.

What is in it for you?

  • You will learn all Ethical Hacking techniques and also you will learn to apply them in real world situation.
  • You will start to think like hackers.
  • You will be able to Secure your computer from Trojans, Worms, Ad-wares etc.
  • Amaze your friends with your newly learned tricks.
  • You will be able to protect your self from future hack attacks.
  • And Much more…

Special Offers for you

Along with this E-book you will get 2 bonus packs for free.
  • 1000 Hacking Tutorial : Hacking Tutorials contains1000 of the best hacking tutorials of 2010 leaked on the internet!
  • Set of Phishers : You will also get a set of 30+ phishers(Fake login page) created by Rafay Baloch.
These offers are limited period only,so what are you waiting for Go and grab a Copy of “A Beginners Guide To Ethical Hacking” and start your Hacking journey.

Click Here To Download From Torrent 

Call Of Duty Modern Warfare 2 All Hacks 2012

List 


MW2 Colored Player Textures ( Full & Light Version , Reworked ) STEAM ONLY !
.NET External BoxESP & Aimbot [Steam]
TokolocoSK MW2 HOOK v1.0
F'ozz - MW2 Multiplayer Trainer V1.0
[Leeched] MW2 Multi Hack {NHVH} 4.0 RE-POSTED WITH FIXES 




Saturday, July 21, 2012

Break Windows 7 password from safe mode

if u wanna  break Windows 7 password from safe mode u hve to Enable the built-in Administrator account



To create a password for the Administrator account, we should know that, Windows 7 has a default administrator account that is created during the installation of Windows 7. By default, the built-in administrator account is named Administrator, and is disabled.



If you don’t want to create another Windows 7 Administrator account, just enable the built-in Administrator.
The following is the guidance to you to enable Windows built-in Administrator account.



1. Start System and press” Ctrol+Alt+Delete” to enter Safe mode with Command Prompt



2. Choose Administrator and you will enter the elevated command prompt, type net user administrator /active:yes and press Enter



3. Close the command prompt. Restart the computer and you will now see the built-in Administrator account log on icon added on Screen.

Autorun.inf Remove From Your Computer

Method 1Open command prompt. Go to Windows, then Run, and type "cmd" . Press enter.

2 Type "cd\" and press enter to get to the root directory of c:\ .

3 Type "attrib -h -r -s autorun.inf" and press enter.

4 Type "del autorun.inf" and press enter.

5 Repeat the same process with other drives, type "d:" and do the same thing. then next "e:".and restart your computer.

Break Windows 7 password (win xp,win vista,win 7.....)

First Step Download this soft(image)
All windows Password Remover;
Download
4sharerd
mediafire

Burn Image to the CD..As a bootable CD.>Inter the CD in to the rom and restart pc.then boot cd and dnt mind that rusian  words..if your  windows operating systems is dual boot u he select one...then displayed all user accounts and Administer account...then select one as urs wish then remove password....

CUSTOMIZE YOUR FACEBOOK LOGIN PAGE

I don't know whether you will like it not but like Windows Logan Screen you can customize your Facebook Login page too. Now you can make your own Facebook Login Page it your bored with normal one.
have to download and To customize Facebook Login page you install this extension for Google chrome from Here named FB Refresh .Now just set the background image URL and Customize Your Facebook Login Page.

SEND FREE SMS VIA FACEBOOK

There are lots of websites over the internet that offers free SMS (Short Messaging Service) or even anonymous SMS services. But you will be amazed to know that your all time favourite Social Networking website Facebook also offers free sms service. You can send free SMS all around the globe for free. There is a Facebook Application ChatSMS that provides this awesome feature. The limitation of this App is that you can send only 100 character long SMS.

How to Send Free SMS via Facebook: 


Login to your Facebook Account and go to ChatsSMS Application

When the Request and Permission window opens then click on Allow button.  

In the next window select the country and country code where you want to send the SMS. 
In the Phone Number field give your Friends mobile number and in the SMS text field type your message that you want to send.






After this click on Send SMS button and your SMS will be delivered within few seconds.
The sent message will contain the First name of your Facebook with your precious message.

How to hack websites by Remote File Inclusion

                             Hello friends,Today i am going to explain and advanced method of hacking websites that is How to hack websites using Remote File Inclusion. As the name suggests Remote File Inclusion is technique where we inserts the file (in hacking terminology called Shell) in to the Website and gets the admin rights. Lets discuss this type of Website hacking technique in detail, so friends read on...





What is Remote File Inclusion?

                                  Remote File Inclusion is a method of hacking websites and getting the admin rights of the server by inserting a remote file usually called as SHELL (a shell is graphical user interface file which is used to browsing the remote files and running your own code on the web servers) into a website, whose inclusion allows the hackers to execute the server side commands as a current user logged on, and have the access to all the server files. With these rights we can continue to use local exploits to escalate our privileges and get control over the whole server.


Note: Remote File Inclusion (RFI) is the best ever technique to hack websites and more than 60% websites on the internet using PHP are vulnerable to this attack.

The Mole v0.3 Released : Automatic SQL Injection Exploitation Tool


Nasel has just released the new version of The Mole, an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique.


This release has introduced new features compared with the previous one, among these you can find that The Mole is now able to exploit injections thourgh cookie parameters. A new promising feature is that now you can exploit injections that return binary data, to achieve this the mole uses uses HEAD requests and analyzes the headers received (the size of the binary to download usually differs when the query was successful or not) and does not need to download the full binary data.


In this release there has been a major change in the The Mole's architecture, and now allows to easily insert filters in order to bypass IPS/IDS rules or modify the query on runtime. You can see a tutorial on how to write these filters in the tutorial section of the tool's site.


Feature:



  • Support for injections using MySQL, SQL Server, Postgres and Oracle databases.
  • Command line interface. Different commands trigger different actions.
  • Auto-completion for commands, command arguments and database, table and columns names.
  • Support for filters, in order to bypass certain IPS/IDS rules using generic filters, and the possibility of creating new ones easily.
  • Exploits SQL Injections through GET/POST/Cookie parameters.
  • Developed in python 3.
  • Exploits SQL Injections that return binary data.
  • Powerful command interpreter to simplify its usage.

F.lux Protects your Eyes while using PC or Browsing Internet

F.lux is known for providing better lightning for your pc, usually you love using your desktop or laptop for browsing internet or watching movie playing games and blah blah for everything. But while going these all stuff you probably are lacking into one major thing destroying your eyes daily and regularly. Well there are many things or measures you can take to overcome this problem, you can go for a eye protecting shield or now comes the easy software installing way which F.lux brings in.


F.lux simply adapts the color from the time of the day. So if its morning you will see your screen bright and shiny and as soon as the day is going to be over your screen will also start loosing that brightness and hence it will adapt the color which suites best to your eyes, so now no matter for how long you work on your pc, this thing will simply remove all those working restrictions for a pleasant workout.


Download F.lux  now, its available for Windows, Mac, iPhone/iPad for free, so grab it and start protecting your eyes form cruel desktop lightning. 

Free E-Book : An Introduction To Keyloggers, RATS And Malware



Some Days Ago "Rafay Baloch" has launched a new book named "An Introduction To Keyloggers, RATS And Malware". This is A Freeware and You can download it on Mediafire.

Here is what it's Author says about it:-

Today I have decided to launch my new book "An Introduction To Keyloggers, RATS And Malware", The book is completly dedicated to newbies who are looking forward to play with keyloggers, Rats and various other forms of malware or are curious to know how they can protect their PC's from getting infected with Trojan, worms and other forms of viruses.The book takes you right from the beginning from basics to some advanced types of attacks too, In this book I have also reviewed various types of best keyloggers out there so you can find it easier to to choose the best one according to your needs.. By reading this e-book I am very confident that you will be able to protect your computer from most of these types of attacks.

How to make a computer virus using JPS virus maker


Note:- This tutorial is for educational purpose only, we are not responsible for any physical or internal damages caused during the process.


Step 1:- Download the Necessary software for VIRUS making. Download Jps virus maker


Step 2:- Unrar the pack.(if compressed)

Step 3:- Now open the software and You Will Get the Following Screen.

Step 4:- Now Select any (can be more then one) Victim option from the given options as done above.

Step 5:- For Virus of Fake Message select the Fake Error Message and write the message you want to display in caption and Title Like "Error" .

Step 6:-To change the Password of the computer on execution of virus check CHANGE XP PASSWORD and type the new password.

Step 7:-To Run any program on starting the XP click on “Run Xp Program before Execute ". And then select any Program from list you want to run at the Starting on Xp.

Step 8:- Now select any server Icon; it is the icon of the virus file.

Step 9:- Now select any virus Name from the list so it cannot be seen in the process from its own name.

Step 10:- Click on the "make virus” Button and the virus is made.

Step 11:- Now send this file to your friends and see what happens to his/her PC.

AVAST ANTIVIRUS PRO LICENSE FILE




Hello frnds Today iam introduce you how you can use free avast pro version.So keep following the simple procedure.


download avast antivirus from the avast official site from #Hear Avast license can be found from the below link after you download the avast antivirus just click on Insert License key under subscription and choose the license file



4shared


mediafire