Pages

Subscribe:

Ads 468x60px

Labels

Translate

Monday, July 30, 2012

Hacking Gmail


Download PDF From Mediafire

Saturday, July 28, 2012

Most Popular Hackers Of All Time


I mentioned few most popular Hackers in this article. This article contains a combination of both “White and Black Hat” Hackers. Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. “Hack” may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem, such as a “kludge”.




The terms “hack” and “hacking” are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as by circuit bending. It is from this usage that the term “hacking” is often used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime (via Wiki).

How to hack wifi password?

Learn how you can easily hack a wifi password.
This includes for WEP, WPA, WPA2, WPS encryption.
You can do it from Windows7 or Mac OS X.
With Portable Penetrator you can easily recover WEP WPA WPA2 WPS wifi password.
Learn to secure your wifi so it dont get hacked.
Portable Penetrator Interface  

You Are Losing the Battle With Hackers. Yes, You.


You Have Been Hacked
“We’re not winning. … I don’t see how we ever come out of this without changes in technology or changes in behavior, because with the status quo, it’s an unsustainable model. Unsustainable in that you never get ahead, never become secure, never have a reasonable expectation of privacy or security.”
That’s a quote from Shawn Henry, the FBI’s top cyber cop who has spent two decades with the bureau, from a recent interview with the Wall Street Journal. And he’s not alone in thinking that there needs to be fairly substantial changes to software and network security.
James A. Lewis, a senior fellow on cybersecurity at the Center for Strategic and International Studies, said that as gloomy as Mr. Henry’s assessment may sound, “I am actually

Web Hacking Attacks and Deffense.pdf

Download PDF From Mediafire

Hack email accounts or passwords using session cookies

:D

Hi friends,Today i will show you the practical implementation of session hijacking that how can we take over others sessions and hack his email accounts and other website passwords. In this tutorial of hacking email accounts using session cookies, i will explain you with the help of yahoo account. I will tell you how to hack yahoo account using session cookies.

What are Session Cookies or Magic Cookie or Session ID?
Lets discuss this in very simple language, Whenever we login in our account, it generates a unique string that contains the path of automatic login for particular time then after that limited time it expires by itself.

Thursday, July 26, 2012

A BEGINNERS GUIDE TO ETHICAL HACKING

Apart from Hacking stuff, this book will also teach you the security aspect and after that you don’t have to worry about being hacked by other hackers.

What is in it for you?

  • You will learn all Ethical Hacking techniques and also you will learn to apply them in real world situation.
  • You will start to think like hackers.
  • You will be able to Secure your computer from Trojans, Worms, Ad-wares etc.
  • Amaze your friends with your newly learned tricks.
  • You will be able to protect your self from future hack attacks.
  • And Much more…

Special Offers for you

Along with this E-book you will get 2 bonus packs for free.
  • 1000 Hacking Tutorial : Hacking Tutorials contains1000 of the best hacking tutorials of 2010 leaked on the internet!
  • Set of Phishers : You will also get a set of 30+ phishers(Fake login page) created by Rafay Baloch.
These offers are limited period only,so what are you waiting for Go and grab a Copy of “A Beginners Guide To Ethical Hacking” and start your Hacking journey.

Click Here To Download From Torrent 

Call Of Duty Modern Warfare 2 All Hacks 2012

List 


MW2 Colored Player Textures ( Full & Light Version , Reworked ) STEAM ONLY !
.NET External BoxESP & Aimbot [Steam]
TokolocoSK MW2 HOOK v1.0
F'ozz - MW2 Multiplayer Trainer V1.0
[Leeched] MW2 Multi Hack {NHVH} 4.0 RE-POSTED WITH FIXES 




Saturday, July 21, 2012

Break Windows 7 password from safe mode

if u wanna  break Windows 7 password from safe mode u hve to Enable the built-in Administrator account



To create a password for the Administrator account, we should know that, Windows 7 has a default administrator account that is created during the installation of Windows 7. By default, the built-in administrator account is named Administrator, and is disabled.



If you don’t want to create another Windows 7 Administrator account, just enable the built-in Administrator.
The following is the guidance to you to enable Windows built-in Administrator account.



1. Start System and press” Ctrol+Alt+Delete” to enter Safe mode with Command Prompt



2. Choose Administrator and you will enter the elevated command prompt, type net user administrator /active:yes and press Enter



3. Close the command prompt. Restart the computer and you will now see the built-in Administrator account log on icon added on Screen.

Autorun.inf Remove From Your Computer

Method 1Open command prompt. Go to Windows, then Run, and type "cmd" . Press enter.

2 Type "cd\" and press enter to get to the root directory of c:\ .

3 Type "attrib -h -r -s autorun.inf" and press enter.

4 Type "del autorun.inf" and press enter.

5 Repeat the same process with other drives, type "d:" and do the same thing. then next "e:".and restart your computer.

Break Windows 7 password (win xp,win vista,win 7.....)

First Step Download this soft(image)
All windows Password Remover;
Download
4sharerd
mediafire

Burn Image to the CD..As a bootable CD.>Inter the CD in to the rom and restart pc.then boot cd and dnt mind that rusian  words..if your  windows operating systems is dual boot u he select one...then displayed all user accounts and Administer account...then select one as urs wish then remove password....

CUSTOMIZE YOUR FACEBOOK LOGIN PAGE

I don't know whether you will like it not but like Windows Logan Screen you can customize your Facebook Login page too. Now you can make your own Facebook Login Page it your bored with normal one.
have to download and To customize Facebook Login page you install this extension for Google chrome from Here named FB Refresh .Now just set the background image URL and Customize Your Facebook Login Page.

SEND FREE SMS VIA FACEBOOK

There are lots of websites over the internet that offers free SMS (Short Messaging Service) or even anonymous SMS services. But you will be amazed to know that your all time favourite Social Networking website Facebook also offers free sms service. You can send free SMS all around the globe for free. There is a Facebook Application ChatSMS that provides this awesome feature. The limitation of this App is that you can send only 100 character long SMS.

How to Send Free SMS via Facebook: 


Login to your Facebook Account and go to ChatsSMS Application

When the Request and Permission window opens then click on Allow button.  

In the next window select the country and country code where you want to send the SMS. 
In the Phone Number field give your Friends mobile number and in the SMS text field type your message that you want to send.






After this click on Send SMS button and your SMS will be delivered within few seconds.
The sent message will contain the First name of your Facebook with your precious message.

How to hack websites by Remote File Inclusion

                             Hello friends,Today i am going to explain and advanced method of hacking websites that is How to hack websites using Remote File Inclusion. As the name suggests Remote File Inclusion is technique where we inserts the file (in hacking terminology called Shell) in to the Website and gets the admin rights. Lets discuss this type of Website hacking technique in detail, so friends read on...





What is Remote File Inclusion?

                                  Remote File Inclusion is a method of hacking websites and getting the admin rights of the server by inserting a remote file usually called as SHELL (a shell is graphical user interface file which is used to browsing the remote files and running your own code on the web servers) into a website, whose inclusion allows the hackers to execute the server side commands as a current user logged on, and have the access to all the server files. With these rights we can continue to use local exploits to escalate our privileges and get control over the whole server.


Note: Remote File Inclusion (RFI) is the best ever technique to hack websites and more than 60% websites on the internet using PHP are vulnerable to this attack.

The Mole v0.3 Released : Automatic SQL Injection Exploitation Tool


Nasel has just released the new version of The Mole, an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique.


This release has introduced new features compared with the previous one, among these you can find that The Mole is now able to exploit injections thourgh cookie parameters. A new promising feature is that now you can exploit injections that return binary data, to achieve this the mole uses uses HEAD requests and analyzes the headers received (the size of the binary to download usually differs when the query was successful or not) and does not need to download the full binary data.


In this release there has been a major change in the The Mole's architecture, and now allows to easily insert filters in order to bypass IPS/IDS rules or modify the query on runtime. You can see a tutorial on how to write these filters in the tutorial section of the tool's site.


Feature:



  • Support for injections using MySQL, SQL Server, Postgres and Oracle databases.
  • Command line interface. Different commands trigger different actions.
  • Auto-completion for commands, command arguments and database, table and columns names.
  • Support for filters, in order to bypass certain IPS/IDS rules using generic filters, and the possibility of creating new ones easily.
  • Exploits SQL Injections through GET/POST/Cookie parameters.
  • Developed in python 3.
  • Exploits SQL Injections that return binary data.
  • Powerful command interpreter to simplify its usage.

F.lux Protects your Eyes while using PC or Browsing Internet

F.lux is known for providing better lightning for your pc, usually you love using your desktop or laptop for browsing internet or watching movie playing games and blah blah for everything. But while going these all stuff you probably are lacking into one major thing destroying your eyes daily and regularly. Well there are many things or measures you can take to overcome this problem, you can go for a eye protecting shield or now comes the easy software installing way which F.lux brings in.


F.lux simply adapts the color from the time of the day. So if its morning you will see your screen bright and shiny and as soon as the day is going to be over your screen will also start loosing that brightness and hence it will adapt the color which suites best to your eyes, so now no matter for how long you work on your pc, this thing will simply remove all those working restrictions for a pleasant workout.


Download F.lux  now, its available for Windows, Mac, iPhone/iPad for free, so grab it and start protecting your eyes form cruel desktop lightning. 

Free E-Book : An Introduction To Keyloggers, RATS And Malware



Some Days Ago "Rafay Baloch" has launched a new book named "An Introduction To Keyloggers, RATS And Malware". This is A Freeware and You can download it on Mediafire.

Here is what it's Author says about it:-

Today I have decided to launch my new book "An Introduction To Keyloggers, RATS And Malware", The book is completly dedicated to newbies who are looking forward to play with keyloggers, Rats and various other forms of malware or are curious to know how they can protect their PC's from getting infected with Trojan, worms and other forms of viruses.The book takes you right from the beginning from basics to some advanced types of attacks too, In this book I have also reviewed various types of best keyloggers out there so you can find it easier to to choose the best one according to your needs.. By reading this e-book I am very confident that you will be able to protect your computer from most of these types of attacks.

How to make a computer virus using JPS virus maker


Note:- This tutorial is for educational purpose only, we are not responsible for any physical or internal damages caused during the process.


Step 1:- Download the Necessary software for VIRUS making. Download Jps virus maker


Step 2:- Unrar the pack.(if compressed)

Step 3:- Now open the software and You Will Get the Following Screen.

Step 4:- Now Select any (can be more then one) Victim option from the given options as done above.

Step 5:- For Virus of Fake Message select the Fake Error Message and write the message you want to display in caption and Title Like "Error" .

Step 6:-To change the Password of the computer on execution of virus check CHANGE XP PASSWORD and type the new password.

Step 7:-To Run any program on starting the XP click on “Run Xp Program before Execute ". And then select any Program from list you want to run at the Starting on Xp.

Step 8:- Now select any server Icon; it is the icon of the virus file.

Step 9:- Now select any virus Name from the list so it cannot be seen in the process from its own name.

Step 10:- Click on the "make virus” Button and the virus is made.

Step 11:- Now send this file to your friends and see what happens to his/her PC.

AVAST ANTIVIRUS PRO LICENSE FILE




Hello frnds Today iam introduce you how you can use free avast pro version.So keep following the simple procedure.


download avast antivirus from the avast official site from #Hear Avast license can be found from the below link after you download the avast antivirus just click on Insert License key under subscription and choose the license file



4shared


mediafire