Saturday 24 September 2011

Trace Emails

Many times you get fake emails and wanna know about the person who send you this email. It possible to find out origin of the EMAIL. The only thing you need to know is how to get email message header. Just copy the message header and paste it to the tracker system. And it will give you the location of the email sender's IP address.Trace-mail   

Trace Mobile Number,Vehical Number etc.

Many people want this type of services and searched over internet a waste their time but unable to get desired results.
A few days ago i got a website which have a lots of tracing services. It shows tracing results in a map along with all suitable information you want to know.

Saturday 17 September 2011

How To Disable The Keyboard Using Batch Script

How To Disable The Keyboard Using Batch Script

Just copy and paste the code below in notepad and save it as “anything.bat”. What it exactly does is modifies the registry value of keyboard layout of each keys and finally disabling all the keys.

Ten Great Scripts to Trick your Friends - Simple yet Freaky!!!

 Ten Great Scripts to Trick your Friends - Simple yet Freaky!!!

Here are some cool freaky tricks to prank your friends. Just type the given code or copy and paste it in Notepad and save it accordingly.

1) Display a Small message and then shut down his / her computer :
    TYPE THIS CODE :
    Code:
    @echo off
    msg * I don't like you
    shutdown -c "Error! You are too stupid!" -s
    Save it as "Anything.BAT" in All Files and send it.

Thursday 15 September 2011

Clickjacking New Hacking Attack


 Clickjacking
I was surfing around the internet when i saw the news saying that clickjacking attack is now targeting facebook users. yeah it's bad news for facebook user. Then it came in my mind that i didn't tell my readers about this attack. Now it is important to know about this attack because this is very advance attack and need some programming skill. I will try to explain it in simple but it is li'le bit complicated for a non programmer to understand but now too hard as as you are thinking now :)

Speed up Firefox


 Speed up Firefox
Speed up your browsing speed of Firefox browser. You just need to change some Firefox settings. follow these steps-

Social Engineering Hacking


 Social Engineering


This method is really an effective nontechnical way of breaking the security of a system or a network. It’s the process of deceiving users of a system and convincing them to give out some information that can be used to defeat or bypass security of a system or network. This process is easy to understand. But there are a lot of people who think that this is not an effective way but as i think this is very effective process of breaking into a system or network.  This method can be used to gather information before or during an attack.

DOS TUTORIAL-How to crash small websites using RDOS

DOS [How Does it Happen] 
How do hackers crash small websites using RDOS

Have you ever wanted to DOS attack on a website. Here I am going to write about a tool which is really helpful but it wouldn't be effective on big servers. 

NOTE: Please do not try to this tutorial to harm any other's website. I will not be responsible in any case. If you are not agree, please leave this website without reading further tutorial

Footprinting tutorial - Information gathering of the Target

 
Footprinting tutorial - Information gathering

This tutorial is those who are appearing for the CEH exam. They can use it as a study material for their exam studies.
Footprinting is the first phase of hacking. It involves information gathering about the victim. Here Victim may be a computer system, network or website. This part of hacking is very important because to hack a computer system, hacker needs to know much about the target. The data gathered in this phase is used to hack the victim or system. Footprinting can reveal system vulnerabilities and identify the ease with which they can be exploited. 

Password guessing attack



Tutorial on Password guessing attack


Passwords are used in every system for authentication of a user. Password is a set of symbol associated with a user. Password guessing attack is a type of attack in which an attacker tries to gain access of a system or network with a guessed password. Guessing a password is very simple type of attack but it is most effective if you know about the victim. The latest form of password guessing attack is carried out by automated tools which guess and try the password again and again to get the access of a system.

HOTMAIL HACKING INFO.



HOTMAIL HACKING INFO.
I_1_I  - Brute force hacking
a. Use telnet to connect to port 110 (Hotmail´s pop-server)
b. Type USER and then the victim´s username
c. Type PASS and then the guess a password
d. Repeat that until U have found the correct password.
!. This is called brute force hacking and requires patience.
It´s better than trying to guess the victims password on
hotmail homepage only because it´s faster.
____

Wednesday 14 September 2011

Facebook Offers $500 For Bug Reporting


Facebook Offers $500 For Bug Reporting


Facebook has taken a step to find bugs in its social networking website. It has announced a bug bounty program rewarding $500 for finding bugs in the facebook. facebook announced this by its page.  facebook wrote, "To show our appreciation for our security researchers, we offer a monetary bounty for certain qualifying security bugs."
To qualify for a bounty, you must:

How to send phishing page to the victim



How to send phishing page to the victim

Revolve Images On Facebook


Hi friends I hope you all are fine, Today I didn;t have hacking trick for you but yes, I have very funny trick for all of you. That will make all images on facebook revolving , This trick can help you to impress a girl easily . Read Out whole post to know more.....

Hacking Facebook (Phishing)

 What is phishing?

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to fool users,and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

Tuesday 13 September 2011

Chat With Command Prompt

Chat With Command Prompt


If you want personal chat with a friend
you don't need to download any yahoo messenger
All you need is your friends IP address and Command Prompt.
Firstly, open Notepad and enter:

Monday 12 September 2011

Facebook Magical Tricks


facebook magical tricks | play with your fb page

This is a simple facebook trick. Those who know JavaScript and document object model(DOM) can easily understand this trick. This is really cool trick and trusted too. feel free to use it. 
If you know DOM and JavaScript, you can modify this code for any website you like..
Here i am showing you two magical tricks which are really funny. Try and have fun

Bold and Underline in chat


In my last  post i wrote about facebook smileys . Now i am going to tell you how to write bold and underline text in facebook chat.

Now here are the facebook codes for sending bold and underlined text in facebook chat.

Facebook simleys codes


We all use facebook as a social networking website and chat with online people with its chat service. But  many of us unaware of facebook smileys.

Facebook has bought FB.com domain


Facebook is now on fb.com


Facebook has bought FB.com for 8.5 million dollars from American Farm Bureau. Facebook bought the Web address for Facebook employees' internal use. The transaction was announced by Facebook founder and chief 

URGE : Twitter Hijack Tool by Anonymous


 URGE : Twitter Hijack Tool by Anonymous
Anonymous group has launched a new hacking tool which is known as URGE. U.R.G.E. Universal Rapid Gamma Emitter (twitter edition)” which hijacks trending topics of our choice and and lets us tweet messages within them. 

Hacking Tool: Brutus

Hacking Tool: Brutus

Brutus is an online or remote password cracker. More specifically it is a remote interactive authentication agent. Brutus is used to recover valid access tokens (usually a username and password) for a given target system. Examples of a supported target system might be an FTP server, a password protected web page, a router console a POP3 server etc. It is used primarily in two ways:

Sunday 11 September 2011

Unknow fact microsoft word

Bill Gates still doesn't know why it happens:
Try out yourself...
Open Microsoft Word and type
=rand(200,99)
and then HIT ENTER....see what happens.
it won't hurt ur system!!

Disable drives in My Computer from unknown user

  If you want to prevent any users to access your computer or network shared drives using My Computer then you can hide the all drives for example C:/, D:/ and save your data from any unknown user. But next time you can turn on the display of these drives using registry editor. Now edit the computer registry to turn off the display of drives, but be careful to work with computer registry.

Saturday 10 September 2011

Windows Genuine Hack

Windows Genuine Hack

1) Download “Windows.Genuine.Advantage.Validation..rar”
2) Extract It.
3) Run “installer.bat” file.
4) Reboot.
5) Enjoy Your Validated Windows.
windows genuine
Download :
http://rapidshare.com/files/115531401/Windows.Genuine.Advantage.Validation..rar

Hide folders without any software

First create a new folder somewhere on your hard drive
when you name it hold down “Alt” and press “0160” this will create and invisible space so it will apper as if it has no name.
then right click in and select “Properties” select the tab “coustimize” and select “change icon” scroll along and you should a few blanc spaces click on any one and click ok when you hav saved the settings the folder will be invisible to hide all your personal files

Hacking Techniques

1) CALLBACK UNITS:

Callback units are a good security device, But with most phone systems,
it is quite possible for the hacker to use the following steps to get
around a callback unit that uses the same phone line for both incomming
and out going calls:First, he calls he callback unit and enters any
authorized ID code (this is not hard to get,as you'll see in a moment).
After he enters this ID, the hacker holds the phone line open - he does
not hang up. When the callback unit picks up the phone to call the user back,
the hacker is there, waiting to meet it.

Change Text on XP Start Button


Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

Speed Up Internet

Speed Up Internet

Windows 2k/XP

1. First, open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider
2. Note the following lines (all hex dwords):
Class = 008 ( biggrin.gif - indicates that TCP/IP is a name service provider, don't change
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS
3. What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well:
4. Change the "Priority" lines to:
LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 ( biggrin.gif - NetBT name-resolution, including WINS
5. Reboot for changes to take effect

How to get your computer to have an FBI login screen



Access any blocked site by your ISP or Corporate proxy

Access any blocked site by your ISP or Corporate proxy

Guys,
If you need to access any blocked site by your ISP or Corporate proxy, use the info below to fool them.The Tor Browser Bundle contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run

Download :
Try This Buddies..........

Extract it to a USB disk and start "Start Tor Browser.exe" and enjoy the anonymous browsing using the now opened Firefox.

All Web Application Attack Techniques

All Web Application Attack Techniques
This list is not full, if there is some attack I missed post in thread please.

HOW TO REMOTE SHUTDOWN YOUR FRIENDS PC

HOW TO REMOTE SHUTDOWN YOUR FRIENDS PC
hey friend i will show u one cool pretty mischife with ur friends pc
1)first u need to know ur friends pc name/ip-address
u can get pc name by keylogger or many software are avalable
or go to ur friends house open his pc open his my computer right click in my computer and select properties and see his pc name
and dont foget it

2)go to start ---run---type cmd

3)in cmd type shutdown/i

4)then remote shutdown dialog box will appeare
it will look like this in pic

5)click on add button and type the pc name/ip-address of ur friend and press ok

6)and select the option u want like how u want to shutdown after how many time etc...

7)comment : comment u r friend after press ok u r friend will recive ur comment and his computer will shutdown

Disabling all antiviruses

Hi Friends, Hope you all fine...
When you attempt to hack someone's system by RAT, Keylogger or iStealer then you'll first need to FUD your server but its not that much easy to find a good & free working FUD crypter, So first disable your slave antivirus and firewall. So they can't find out your Trojan virus (Server). The below batch program helps you to disable all the running antivirus in the syste. Just save copy and paste it in notepad file and save it with .bat extension.

batch ebomb virus

This is a simple attack that enables running multiple applications in victims pc just to harass him. There are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and type

@echo off
start iexplore
start notepad
start firefox

Creating a Batch virus

I assume you know the basic about batch files before reading this post. Batch files are used to run a dos command without opening command prompt window. You can run many dos commands using a single batch file. For this you have to learn how to write a batch file. I am not going to tell you how to make a batch file. If you don’t know how to write, try to learn it from anywhere else. This post will show you some batch files which can corrupt your window. You can also say that these batch files can work like a virus. So be careful and not to try in your computer.

4 ways on how to hack facebook account

Today i thought to uncover all the methods used to hack facebook password
I will cover 4 methods over here:

1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack

USB Warning message


To have a warning message appear when anybody uses your USB drive simply copy and paste the following code into note pad and then save it as warning.bat on the main directory of your USB drive.

Screen flash batch file trick

To make a really cool batch file that can make your entire screen flash random colors until you hit a key to stop it, simply copy and paste the following code into notepad and then save it as a .bat file.

Friday 9 September 2011

To find whether your computer is “male” or “female”..??



 1. Open Notepad
2. Type the following line in notepad: CreateObject("SAPI.SpVoice").Speak"Agent X Y i love you"
...3. Save file as computer_gender.vbs
...4. Run the file ...

If you hear a male voice, you have a boy.
If you hear a female voice, you have a girl.

What Kind of a Hacker Should you Be? - White hat, Black Hat, or Grey Hat?





Many people want to be hackers. But what type of hacker do you want to be? This article will help you choose! What kind of hacker are you right now? Here are the MAIN types of hackers hidden in the world today....