Tuesday 4 December 2012


Hack Wifi Password In Windows




FIRSTLY WE KNOW ABOUT HOW TO HACK WIFI PASSWORD AND WHAT TOOL ARE REQUIRED TO HACK WIFI PASSWORD
TOOL REQUIRED FOR WIFI HACKING:

1. COMMVIEW FOR WIFI :-

this tool is used for capturing the packet of wifi which we have to crack.this is also used for convert the file which is required for crack ( in this crack we convert .ncf file to .cap file)
you can use this link to download this software CLICK HERE
Link Pass:  canuhack.blogspot.com

2. AIRCRACK -NG :-

this tool is used for retrieve password from captured file from commview for wifi software
to download software please CLICK HERE
Link Pass:  canuhack.blogspot.com

STEP TO HACK WIFI NETWORK IN WINDOW:-

1. install commview
2. after installation a popup window is open in commview software for driver installation .( if pop window not open then goto > help > driver installation guide then do this)
3. install commview driver for your wifi network( without installation of driver you cannot capture data of desired wifi network)
4. after installation of driver click on capture button on left corner of software.
5. a pop up window is open and show wifi network near you.
6. select wifi network which you want to hack and click on capture.
you must need to see your connection is wep or not.(this trick only work with wep)
7. after that you can see the commview capture wifi data.
8. now goto to logging panel in commview and tick on auto saving and put
maximum directory size, mb – 2000
average log file size- 20
9. now capture packets for 2-3 hour.( about 1 lakh packet)

STEP TO CONVERT CAPTURED FILE.

open commview and follow step
1. goto file>log viewer
2. after open log viewer
3.goto file> load commview log> select all capture file > then open
4. after opening goto>export logs > select wireshark tcpdump format
5. save file with desired location (this file is used for cracking password)

CRACK PASSWORD USING AIRCRACK-NG:-

1. open download package.
2. goto bin and open aircrack-ng GUI.exe
3. open converted file
4. select key size – 64
5. click on launch
6. index no. of target file is– 1
7 wait for cracking password
8. if wifi password is cracked then it write
password 100% decerypted 94:13:26:54:66
in this password is 9413265466 for wifi
IF NOT CRACKED IN FIRST ATTEMPT 
1. if password is not cracked then it say FAILED NEXT TRY WITH 5000 IVS.
2. so we have to again capture packets and repeat above process again till password is crack.
NOTE:- when we again capture packet and convert it into cap then we have to select all previous captured packet also to convert.

Thursday 29 November 2012


FAQ: How do I hack?


Learn How to Become a Hacker

These days i am getting more and more emails where my readers are asking me to teach them how to hack. Here is a message i received few days ago that made me laugh: "Alexander, please teach me how to hack email account and i will give you my girlfriend for one night".
So here i will answer some of the most frequently asked questions that every beginner asked before start hacking.

The best way to start hacking is to teach yourself !!!


How do I hack?

There is no easy way how to hack. Google is your best friend.. REMEMBER THAT! Read any information you can find on hacking. Read hacking forums and check out hacking websites. Learn a programming language like C++. Get a book like Hacking for Dummies which will teach you a lot.

What do I need to be able to hack?

Firstly you need to understand how your computers operating system works, networks and protocols works, security settings and general PC knowledge. After you understand how it works you need hacking tools which helps you to hack.

What is command prompt (cmd- the little dos Windows)?

Go START, RUN and type in: "cmd"

What can I do in cmd?

You can can do various things with it like run exploits or do a ping request.

Why does some of the hacking tools I download just close itself when I open them?

Lots of hacking tools are DOS based and has to be run through CMD. If you double click on the program it will open a DOS box and automatically close the box. From CMD you can navigate to the directory which your hacking tool is stored in and run it from there. Other hacking tools are GUI ( graphical user interface ) based and it will open like a normal Windows based program.

What is a IP address?

Every computer connected to the Internet or some network has a IP address. Goto START, RUN and type in "cmd" then type in "ipconfig" it will show you your IP address or addresses. It will look something like this : 81.35.99.84. IP = internet protocol.

How do I find someone's IP address?

There are many ways to find someones IP address. Here are two tutorials that will teach you how to hack an IP Address: How to Hack Someones IP Address and How to Find The IP Address of An Email Sender

What can I do with a IP?

Well you need someone's IP before you can hack, portscan or DOS them.

What is 127.0.0.1 IP?

It is your PC's local loopback IP address.

Why do I have two IP addresses when I do a ipconfig?

Well if your on a local LAN (Local area network) you will have a IP like 192.168.0.1. If your also directly connected to the internet you will have another IP address like 80.87.34.56. 192.168.0.1 is your local IP which you use to communicate with your local internet network (lan) and 80.87.34.56 is your internet IP.

What is a static and dynamic IP address?

Static means permanent set IP address - like a website will have a static IP address, it never changes. Dynamic means temporary IP address - dailing up to the Internet with a modem or most ADSL connections has dynamic IP's. Every time you logon to the Internet your ISP ( Internet Service Provider ) will issue you a new IP address.

I have sent someone a trojan but I cannot connect to their PC?

Either they are running a firewall which blocks you from connecting to their PC, or they are connected to the internet through a router.

What do I do when someone is behind a router and I want to control their PC with a trojan?

You will need to use a trojan which uses reverse connections - meaning you don't connect to the host, the host connects to you. Bifrost is a trojan which has the mentioned function. Remember when someone is behind a router and your using IPstealer to get hold of their IP address, you are actually getting their routers IP, not their actual PC's IP. The router will have the persons internet IP (WAN IP) and their PC will have a different IP - their LAN IP.

How do I check if my own PC is infected with a trojan?

Do a port scan on your PC and check which ports are open. If you find any open ports in this trojan port list you might be infected with a trojan. Download the trojan you think you might be infected with and connect to that specified port.

What is a router?

A device which is used to route data on a network. a Router decides where certain traffic should be sent to.

What is a firewall?

Its a software or hardware device which can block or permit certain ports or IP's or certain kinds of data.

What is a port and what can I do with it?

Every program running on your PC which has some network function uses a specific port to send an receive data though. If you do a port scan you will see which ports are open on the host you scanned. Port 80 is normally a web server. Port 21 a FTP server ect ect.. Trojans also uses ports. Check this list of trojan ports, if you find an open port in this list, the host might be infected with a trojan, download the trojan and try connecting to the port.

How do I do a port scan?

You need a program like SuperScan to do a portscan. Then all you do is add the ip you want to scan.

Why do you want to scan ports?

If you scan a PC with a port scanner, it will show you which programs or services are running on the PC.

Common ports:

Ping : 7
Systat : 11
Time : 13
NetStat : 15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110

What is a exploit?

It's a poorly coded piece in software which you can use to gain access to the system. There is many exploits available for the various MS Windows's out there.

How do I use a exploit?

You first need to compile the exploit with a program like Bloodshed C++ compiler. Then you can start the exploit through command prompt and see if the system your trying to exploit is vulnerable to that specific exploit. Scroll down for more information about exploits.

What is a exploit POC?

POC stands for proof of concept and it the proof that a exploit works.
What is a DOS attack? - It is when too much data is being sent to a host and it cannot handle all the data and disconnects from the Internet.

How do I see what connections is currently made to my PC?

In cmd type in "netstat" - it will show you IP addresses of connections to your PC and what port it is using.

What is a MAC address?

Its a hard coded number, almost like a name which is embedded into a network card. It identifies the manufacturer of the card and a unique number for the card. No two network cards in the world has the same MAC address.

How do I find out my own or someone else's MAC address?

Your own MAC = Goto cmd and type in "ipconfig /all"
MAC address looks something like this : 00-13-20-A3-0B-4C
Someone else's MAC address you need their IP address and then goto cmd and type in "nbtstat -a 192.168.0.5" or whatever IP they use. This will show you their MAC address as well as their currently logged on user.

What is a Windows Registry and how do I access it?

Its where Windows stores most of the configurations of your operating system and most programs installed. You might used it to make a trojan server file you uploaded to the PC run automaticly when Windows starts up. To access the registry go START, RUN and type in "regedit"
Careful what you change in the registry, it might screw up you PC.. First make a backup of the registry.

How do I hack a webpage/ web server?

Search on google for IIS hacking tutorial, but remember not all webservers run IIS!

What is IIS?

It is Microsoft's web server. IIS - Internet information server. Most webservers run on port 80.

How do I hack into a Gmail, Yahoo or Hotmail email account?

Every now and then someone discovers a way to get into those email servers, but the service provider fixes the security hole so fast, there is no straight answer for that. Best way is to install a keylogger on the victims PC and get their login details. Otherwise download THIS program which you can use to brute force a hotmail account.

How do I hack into a POP3 email account?

Hydra 5.3 is a program which you can use to crack POP3 accounts. You will need a wordlist which Hydra will use to crack the POP3 password.

What is a keylogger?

It is a program you install on someone's PC which captures every key that is pressed on their keyboard which is emailed to you or stored into a file.

How do I get the administrator account password while logged in to the PC?

Locally run a program like Adminhack for local administrator account cracking. If you need to do it remotely run a program like Venom or Starbrute.

What is a SAM file?

SAM file is the file which stores all the user accounts and their password hashes like the Administrator account. SAM file is stored in "C:\WINDOWS\system32\config" but it is locked and inaccessable while you are busy using Windows - meaning you can't copy it while your in Windows. You need to boot up with another operating system like NTFSDOS or Linux with NTFS support. When you copied the SAM file you can crack the passwords stored in the SAM file with a program like LC5. With Pwdump6 it is possible to get access to the SAM file while logged into windows. It can also connect to a remote PC and grab the password hashes from the SAM file. Administrator account is needed.

How do I reset a administrator or some other account password on Win2K/WinXP/WinNT/Win2003?

Download Offline NT Password & Registry Editor which you can use to create a bootup disk or CD and then boot up the PC and then you can reset the password. Just remember that this program will not show you the password, you can only change the password.

How do I crack a administrator password?

If you need to crack a administrator password you will need to copy the SAM file to another machine and crack it. Download this NTXP-Cracker program which has included everything you need to boot up the PC, copy the SAM file and crack the SAM file on another machine.

How do I find out what operating system does my target run?

Download Detect and use it against your targets IP address.
Result:
C:\>detect.exe 127.0.0.1[*]------------------------------[*][*] XP/2K OS Detector[*][*] by: illwill & phr0stic[*][*]------------------------------[*]
[+] Finding Host 127.0.0.1
[+] Connected to 127.0.0.1
[+] Bytes Sent: 222
[?] The box seems to be Windows XP


Basically these are the frequently asked questions every beginner asked. Hope you'll find this post useful.


FAQ: Phishing to Hack Email Account Passwords

What is Phishing and how to use it for hacking?

I have written much about Phishing on this blog. I received large response for my indepth tutorial on Phishing to hack email account password. Thanks a lot for your kind co-operation. Many readers were able to get the trick or hack of Phishing and how to use Phishing to hack email account. But, some readers were just not able to get out their problems. I have written this article for such readers to help them sort out their Phishing related problems.

I was just going through comments made by you guys and noticed some readers left unanswered or they were not convinced by me. So, here are answers to some of commonly asked questions for Phishing.


1. First of all lets clear What is Phishing:

Basicly phishing is way of sending a fake page to victim which resembles the original page and ask the victim to login with the provided modified page called as phisher. This the most popular method used by hackers to hack email account passwords like myspace, gmail, yahoo, orkut, facebook, etc.

2. Does Phishing help in hacking email passwords?

This was the most basic question I read. No doubt, the reader is newbie and hence I have included this question over here. Helping newbies is my prime purpose. The answer is "Yes. Phishing is meant for hacking email passwords".

3. Which email passwords can be hacked using Phishing?

Phishing can be used to hack any email password or any online account password. It can be email account like hotmail, gmail, yahoo; social networking site account like myspace, orkut, faceboook; banking account; file sharing account or any account you want.

4. How do I perform Phishing?

Phishing is one of the easiest hacking methods. The only thing is you have to get the actual idea of what you have to do to hack email password. You can learn Phishing and how to make your own Phisher by referring my articles "How to Make a Phisher to Hack Any E-Mail Account Password" and "Software to Create Your Own Phisher".

5. What are webhosts?

Webhosts, to explain in short, are offering free webspace where we can upload our created phisher. Phisher is fake login page that we create and we have to upload it on internet. So, we need some space on internet for phisher which is provided by such free webhosts.

I would recommend you following webhosts:

6. Why I can't upload write.php?

Well to upload write.php file, your webhost must support php files. Try using webhosts I have illustrated in Q.5. They all support php.

7. Why I can't run Phisher Creator software on my computer?

For being able to run Phisher Creator software, your computer must have necessary library files installed. Install Library files package and even .NET Framework.

8. How do I send Phisher link to victim?

Get the Anonymous Emailer software and create a fake email and post the phisher link in this email. Ask victim to login to his account using this link. Also try using your logic to make him login to your sent phisher.

9. Why I don't get passes.txt file?

Passes.txt file is created only after victim logins with our sent phisher. If you are trying it, login using phisher and then go to file manager of FTP account. You will see passes.txt file created. If file is not present, try refreshing the page and you'll get it. If you're still not able to get passes.txt file, do one of following:
  • Re-login using phisher.
  • Change your webhost.
  • Re-start from beginning.
Sorry for this... but this has helped many visitors as they don't know where they had made a mistake. So, its always best to restart the process.

10. How do I get my Phisher link?

Go to File Manager. Upload your phisher created by Phisher creator. Now, click on uploaded "index.htm" file. You will see fake page. Now, in address bar, you will get your Phisher link. This is your Phisher link. Send this phisher link to your victim.

11. Why Phishing is not working for me?

I'm received many questions like this. I helped many readers and finally reached conclusion that most of them were not reading my article completely and carefully. So, read article completely and carefully. This is most common error made by readers.


Thats it. I hope now, you will have most of your doubts about Phishing cleared. This article is meant only for you.

Enjoy Phishing to hack email password...

What Are Anonymizers?


Just about everything you do in a computer is logged. In Windows, there are event handels that log main events performed by the user, such as logging into the computer. On Linux, even things such as error logging for the xorg server is performed, and some programs that users intent to use for malicious purposes, even log locally on the computers, without the users consent. The programs are not logging because they know you are conducting abuse, but because the logging is used for error-checking. However, if you find yourself in trouble, the error-logs can point the police to evidence of your mis-doing.

Say you manage to attack and compromise a webserver, and remove the logs, you're still not safe though. There is another thing that prevents you from being completely undetectable, Your IP/Domain address, and this is what this tutorial will primarily be focusing on.

What is an Anonymizer?

Anonymizers are online services that eliminate the trail of information that you leave behind, whilst surfing, so that your online activities cannot be traced back to you. The anonymizers vary in sophistication depending on the level of security and number of features that you require. Some anonymizers require the use of client software and others only require that you log onto their website before browsing other sites.

How do Anonymizers work?

You essentially surf the Web through the anonymizer site, going to that site first and then routing all your pages from there. When you send a page request through the anonymizer, it acts like a super-proxy server, stripping off the header of each data packet, thus making your request anonymous. The requested page is then fed through the anonymizer back to your Web browser.


In order to avoid being tracked, one can use an anonymous proxy to surf the web. An anonymous proxy makes sure your IP address does not get stored on the web server logs. Web servers log every ?GET? request made, together with date, hour, and IP. But if you are accessing the Internet through a proxy server, then the IP of the proxy is logged and not yours.
In case you do not go through an anonymous proxy, then you are actually risking vital information that belongs to you. For example, a hacker can easily find out your IP Address, your web browser, your Operating System and even the previous URL that you have visited. You can also be easily located geographically (provided one has the necessary software tools) because people can find out a whole lot of things that give your location. Like your hostname, your continent, your country, your city and even your Internet Service Provider.
Consider the scenario where a hacker gets access to your computer, he can find out your name, email address, telephone number, various user ID's and passwords, details about software you use and your preferences, locations of files and folders, the search strings that you used and literally hundreds of other personal things. All this information is stored in files like SYSTEM.ini, USER.dat, SYSTEM.dat etc. One very important file is the nsform??.TMP which stores all the data inside every Netscape form you've ever submitted, with and without SSL, when the submission failed or was canceled.

Some of the best Anonymizers:

  • Anonymouse - A very good free anonymizer. By using this CGI proxy you can anonymously surf web pages, send anonymous e-mails and look at news.

  • ProxyKing.net - This anonymizer service keeps websites from tracking your internet movements by preventing them from placing cookies on your home computer.

  • AnonymousIndex.com - Anonymous private surfing service, hide your ip, manage website ads, referrers and cookies through this free web based proxy.

  • HideMyAss.com - Free anonymous browsing, for the times when you REALLY need to hide your ass online!

  • ProxyFoxy.com - Proxy Foxy offers you free anonymous surfing. With our free tool you can surf the Internet safe and secure without revealing your identity. Avoid cookies, spyware and other malicious scripts.

What is a Hacker / Cracker?


A Hacker is known to build things, solve problems and not break or crack any system. The computer industry initially hired good programmers to make sure how to full proof their system. However, over the years, the media, journalism and writers have played a very important role in changing the real meaning of the word hacker. They themselves are very confused in the term Hacker and a Cracker. A typical definition of a Hacker, that today comes to you mind is that a Hacker, is a person who tries to gain unauthorized access to any property and computers. The term Hacker came as slang from the computer world. So, different people have given different definitions to it. But what remains the common point is, that whenever you hear the word hacker, the first think that comes to your mind is always negative and bad. However, the real meaning of a hacker is a programmer who really finds it thrilling to learn more about it, who likes to explore more details about the programming language and hence stretches his or her capabilities more than any average person.

What is a Cracker?

Crackers are people who get cheap thrill out of cracking computer codes, and breaking into systems. Hence, these are the people who have negativity around them and they only believe in breaking or cracking an access to any kind of system that they have no authorization to. They are malicious annoying people who try to uncover sensitive information by poking their unwanted nose everywhere. Hackers on the other hand are knowledgeable and responsible people. They like to take intellectual challenges and like to overcome all limitations that are there in a particular system. Learning to hack is not very easy. It is a special gift that is only given to a selected few. Only people who are good in searching and keeping themselves updated about the latest technology are the one who are blessed with it. Only being good with computers does not qualify one to be a good hacker. Some people also reapply their hacking knowledge to different fields like music and electronic. It is also said the every hacker is independent of any kind of hack he does, call it in the computer field or elsewhere. Hackers are known to be ethical, wise in their practice.

The realty is: “Hackers build things, crackers break them.”

Today the hacker world has been given 3 different names. The White hat hackers, who do all the good things and are positively motivated people, Then we have the Black hat hackers also called the crackers who are usually into negative work of cracking and breaking into someone’s system and finally the third and the last are the gray hat hackers who explore the best of both the worlds. To conclude, we can say that Hackers are people who are skilled programmers that work for a positive cause or a goal, either for themselves or for an organization which could be private as in an industry or for the government.

Thinking of a Hacker

The thinking of a hacker is very much the same as that of a good program developer. Hackers who have been successful have developed a common strategy over a period of time. This strategy is to very patiently and carefully document every step, which is what the programmers do. They are good at analyzing and following a methodical approach of investigation. So when they start they don’t have much as in the background, they start from the starch and gradually build what is called the entire roadmap or game plan.
It is a known fact that in order to think like a master hacker one should imitated all the big hackers both intellectually and emotionally. As they always work on a different platform and it is the platform of Self Belief.

1. The typical thinking of a Hacker is that, they believe that the world is full of ongoing problems which continuously need solutions to it. So looking for solutions should be the ultimate aim and not giving up till the time the problem is cracked.

2. Another fundamental that they work on is that, the same wheel should not be invented twice as it will be a waste of time and effort both. Brains with creativity should be used for new proposes and not older ones. So, they believe in the theory that time is precious and make the best out of it.

3. The third fundamental truth that they believe in is that, repetition is what leads to success and no word like boredom can be found in their dictionary.

4. The next good thing they believe in is Freedom. Most of the hackers work independently and that is a strong foundation for them to grow. It is said that freedom has no limit to the growth of an individual.

5. No replacement for a good attitude. An attitude to fight and not flight. One can give up whenever he or she wants. It is only the attitude that makes you different from the other.

6. Hackers believe in a value system that is not negotiable and do not compromise on it, because if they do then they would be crackers and not hackers.

Documentation is said to be the wisest thing that any developer a simple programmer or a hacker maintains. At times finding solutions is so difficult that is only the documentation that can help one understand the entire process all over again. It is like hunting for a treasure hunt in a jungle with small clues that take you to the next clue and one step closer to the final gift. 

FAQ: Phishing to Hack Email Account Passwords


Hack RuneScape User Account Password | RuneScape Phishing

I have told you how to hack various sites using phishing, like Facebook, Gmail, RapidShare, etc. Now, I am adding one more article about how to hack Runescape account using Runescape Phishing.

Before we start Please Note: Phishing is legally offensive. I am not responsible for any action done by you.


How to Hack RuneScape Account Password?

1. First of all download RuneScape Phisher from here.

2. The downloaded folder contains two files:
  • Index.htm and
  • update.php
3. Now, sign up for free webhost or webhosting service like:
4. After you login to your account, go to File Manager and upload these two files mentioned in Step 2.

5. Now, send this phisher link (index.html link) to your victim and make him login to his Runescape account using your sent Phisher.

5. Once he logs in to his Runescape account using Phisher, all his typed Runescape id and password is stored in "passwords.txt". This file is created in your webhost control panel as shown below.


6. So, you have obtained Runescape password and can easily hack runescape account.

So friends, I hope you are now able to hack Runescape account password using Runescape Phishing. I have tried my best to keep this tutorial simple to help you hack runescape account.

Do you have questions, comments, or suggestions? Feel free to post a comment!

Learn Everything About Phishing


I've been posting a lot about Phishing on this blog. Phishing is the most used method for hacking email accounts. This method is very understandable and easy to use. Many readers were able to get the trick or hack of Phishing and how to use Phishing to hack email account, but some readers were just not able to get out their problems. I have written an article "What is Phishing and How to Use It to Hack Email Account Passwords" where i answered some of the most commonly asked questions for Phishing. But even after this post i keep receiving comments where readers ask me more questions about phishing, so i decided to update the first post about phishing. Here i'm posting this article to answer your question and tell you more about phishing. Now if you are new into this i recommend you to read my first post "What is Phishing and How to Use It to Hack Email Account Passwords", and then continue with this one.


1. What is a phisher

Basically a phisher is a fake login page, that is made to look exactly like the real login page of the real website so as to fool somebody into entering their information and sending it to you.

2. How can I get somebody to login to my phisher?

That's for you to find out, use your mind. Probably the simplest way is Social Engineering and some phishing skill Here is an example :http://imgdevil.com/pfiles/140/phisher.jpg

3. How to use?
  1. Find a web host that supports php.
  2. Upload all of the files to your web hosting.
  3. Goto the link (yoursite.freehostname.com or whatever) and it should show the login if you uploaded it in the root directory. Send your victim the Index page.
  4. To get the passwords they enter gotoyoursite.freehostname.com/passwords.txt, or whatever the name of your text file is.
  5. Remember to have the .txt file always on CHMOD 777 to enable it to be writtable.

4. Changing the log.txt or password.txt to something else

First rename your text file to what you want it, so nobody can guess it.
Then open the next.php (or may be named out.php) and edit the text that says passes.txt to whatever you named your text file.

5. How to hide links in forums?

If your trying to post it where html is allowed its:
http://yourreallink.com

If you are trying to post it on forms its:
[url=http://yourphisherlink.com]http://yourreallink.com[/url]

6. Free Hosting for your phisers

* 110mb - http://110mb.com
* Ripway - http://ripway.com
* SuperFreeHost - http://superfreehost.info
* Freehostia - http://freehostia.com
* Funpic - http://funpic.de
* Freeweb7 - http://freeweb7.com
* t35 - http://t35.com
* Awardspace - http://awardspace.com
* PHPNet - http://phpnet.us
* Free Web Hosting Pro - http://freewebhostingpro.com
* ProHosts - http://prohosts.org
* AtSpace - http://atspace.com
* ByetHost - http://byethost.com/
* 000webhost - http://000webhost.com/
* My5GB - http://www.my5gb.com/
* Oxyhost - http://www.oxyhost.com/
* Rack111 - http://www.rack111.com/
* Ocostwebhost - http://0costwebhost.com/
* FreeZoka - http://www.freezoka.com/

7. Free Domain List

* .TK - http://dot.tk/
* .CJB.NET - http://cjb.net/
* .DOM.IR - http://dom.ir/
* .EURO.ST & MANY MORE - http://ulimit.com/en
* .CO.CC - http://co.cc/
* .CO.NR - http://freedomain.co.nr/
* .US.TT & MANY MORE - http://joynic.com
* .UNI.CC - http://uni.cc/
* .CA.GS - http://ca.gs

8. Email Spammer
http://hackforums.net/email spammer


9. URL Hiders

http://2isp.com

http://tinyurl.com
http://w3t.org
http://lix.in
http://sturly.com
http://urlprune.com
http://rarme.com
http://doiop.com/
http://rapidlayer.in/
http://myref.de/
http://link-protector.com/
http://www.lil-link.com/
http://urlite.com/
http://protect-links.com
http://snurl.com
http://lil-links.com
http://rapidbolt.com
http://snip-it.com 

10. Proxies if you get banned on forums for posting phisers

http://subno.info
http://jeal.info
http://workstudyguide.com
http://mariogold.com
http://unblockthissite.com
http://kproxy.com

11. Interesting tools/sites

http://fakenamegenerator.com/ - hacked a unverified paypal or something change the name no ideas see this
http://www.fakemailer.net/
http://www.deadfake.com/

12. Site to Phish at

http://smforum.net/
http://wrzboard.org/
http://blitzwarez.net/
http://warezscene.org/
http://blackbay.org/
http://warezforum.info/forum/
http://projectw.org/
http://voide.org/
http://warez-it.co.uk/
http://t-warez.com/
http://share4life.co.uk/forums/
http://forumw.org/
http://tehparadox.com/
http://wrzteam.com/vb/
http://katzforums.com/
http://usawarez.net/forum/index.php
http://silentground.org/forums/
http://xtremew.org/
http://wckedforums.com/
http://porn-bb.org
http://www.forumophilia.com/index.php
http://www.warezcountry.org/
http://mpcforum.com
http://gamerzneeds.net
http://gamerzplanet.net
http://puzo.us
http://puso.org

And Any Other Community Out there Basically. Its all about Mixing :D

I am NOT Responsible For ANYTHING You Do With This , I encourage you not to use any of this. It was only created for educational purposes and to demonstrate how web pages are vulnerable. PHISHERS ARE ILLEGAL.

Download Norton 360 Version 4.0 2011 For Free


Well this ain’t a joke. Norton is giving away its Norton360 Version 4.0 and norton antivirus 2011 for 90 days free trial i.e 3 months. This is a special promotional offer. This is an OEM setup installer that has been released by norton in conjunction with microsoft.

If you will directly go to the norton website you will not be able to benefit from this offer instead you will get only a 30-day trial version only after entering your credit card details. But if you use the link that I am giving at the end of this post you will get a 90 day trial and doesn't require to enter your credit card details.

So don't waste your time and try the best antivirus solution as the new norton 2011

* Provides excellent protection against viruses,spywares.
* Its lightweight and uses less system resources.
* Specially Designed for windows 7

Click the link below to download Norton 360 Version 4.0 Or antivirus 2011 for free

Download Norton360 Version 4.0 2011 for free

How to Detect Fake Emails


Yesterday one of my readers asked me about the way to detect a fake mail. I thought that this can become a good point for writing an article. So, I am mentioning some tips to detect fake/fraud/spam mails.

How to Detect Fake Mails:

1. Lets get back to the example I illustrated in my article Fake Mailer. I had used "support@gmail.com" as the sender email address. No doubt, this was fake and the receiver will get the fake email sent by me.

2. Suppose you are the receiver. Now, I will tell you how to recognize this mail as fake. Open the email and hit on "Show Details".

3. Something you must know:



Whenever Google sends you any email, the email details will contain fields like:

- Mailed by
- Signed by (optional)


Also, most of the times, "Mailed by" field will have value:

*.bounces.google.com or
*.google.com


depending on the type of your mail. This is true for every genuine email from every mail provider.

4. But, these two fields will not be present in the details of Fake Mail. Also, if the mail details contain these fields, the value of these fields will not be *.google.com

Fake Mail without "Mailed by" field:



Fake Mail with "Mailed by" field.



As you can see, the "mailed by" field shows the hosting server's name and not the Google server. This means, this server is used to send you the fake email and most probably, the fake mailer is hosted on the same server.


You can also check out the header field to detect fake mails. Follow the steps:

- Open the mail. Hit on down arrow next to "Reply" and click on "Show Original".



- Now, check out "Received" fields. This field will show you the name of server from which the mail is sent. As you can see, we have used "emkei.cz" as our fake mailer. So, it has appeared in "Received" field.

More Tips:

- Fake Mail usually have attractive titles.
- Such mails address receiver as "Dear Customer" or such and do not use your real name.
- Never click on any link in emails. Instead, open such links manually in new tab. Refer my article Anti-Phishing measures for more information.

Follow these tips and you will be able to recognize fake, spoof, spam emails. If you know any other useful tip to detect fake or spam emails, please share it with us in comments.

How To Protect Your Computer From Virus By Disabling Autorun


Most of the computer seems to get transferred from flash drives, pen drives and other portable and removable media. As soon as you plug and play your removable storage media, the windows’ default feature will search for Autorun.inf file which contains all the information about the things to do when media is plugged in.

It can execute programs (probably virus) which are already in removable storage media. Eventually the programs copies itself to the hard drive.

Therefore it is necessary to turn of autorun feature in your windows to get rid of viruses.

In this short tutorial I am going to teach you how to disable your system from searching and executing autorun.inf as soon as the removable storage is plugged in.

Follow this simple step by step tutorial.

First go to Start-> Run

Type: gpedit.msc in run window and press OK button.

It will load the group policy editor window.

In the explorer sidebar at the left, open Computer configuration tree. Inside it open Administrative templates. Again open System folder. (refer to the image below).

Click on the image to Enlarge

At the right side, scroll down for the “Turn off Autoplay”.

Double click to open it.

Click on “Enabled” button and choose “all drives”.


And click on OK button.

Again in explorer sidebar at the left, open User configuration tree. Inside it open Administrative templates. Again open System folder. (refer to the image below).

Click on the image to Enlarge

At the right side, scroll down for the “Turn off Autoplay”.

Double click to open it. Apply the same settings as above and click on OKbutton.

Restart you PC.

Now onwards, your removable media won’t autoplay making your desktop more secure from virus.

How To Recover Your Computer After Virus Attack


Even after the virus is totally removed from the system, some users find it difficult to restore all those things back which were affected by the virus. A virus usually when enters into a system disables the registry editor and task manager so that the user can not remove the virus from the system.

Here is a free tool Re-Enable using which even a novice users can fix all the things which were disabled by the virus. An antivirus can remove the virus files but sometimes it may fail to restore the system settings. In such situations this tool can come handy.

The program has the ability to restore functionality to these Windows features:
  • Windows Registry
  • Command Line Tool
  • Windows Task Manager
  • System Restore Config
  • Folder Options
  • Run command
  • My Computer
  • Task Scheduler
  • Right Click Context menu
  • Ms-Config (Xp only)
  • Control Panel
  • Search

You will require dot net 3.5 or higher version to run this software. Or if you don’t want to download .Net framework then you can try the portable version of this software.

Download Re-Enable

Recover Deleted Data Using FreeUndelete Software


Many times it happens that we accidentally delete some important data from our computer. In such cases data recovery softwares are very helpful but most of them are paid softwares. There are only few Free data recovery softwares available on the the internet and one of them is FreeUndelete.

Before you use FreeUndelete I advise you not to transfer any data to that particular drive from which you have to recover data as it can reduce your chances of data recovery.

Now In post I will give you download link for the Freeundelete software and also highlight some of its main features.

File systems that are supported by freeundelete Software are:

* NTFS 1.0 and 2.0 (Filesystems of windows NT,Xp,Vista,2000 and Windows 7)
* FAT 12,FAT 16,FAT 32 (Windows 98)

Where are the recovered files stored?

The recovered files will be stored at the user specified destination.


Click Here To Download FreeUndelete Data Recovery Software

Cool Tips, Tricks and Hacks for Windows XP


Use these tips, tricks and hacks to save time, solve problems, and have more fun with Windows XP.

Windows XP, arguably the world's most popular operating system, still has lots of tricks up its sleeve. Today I will show you some hidden rooms, some unknown corners in this column that you never knew existed but wanted to. Without much ado lets login to the wonderful hidden world of Windows XP.

1. Deleting System Softwares

XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.


2. Modify autoplay for different types of CD

Windows XP includes the ability to perform different actions depending on the type of CD you insert into the drive. For example, you could set your system to always respond to CDs containing MP3 files by opening Windows Media Player.

To edit the Autoplay properties: Open 'my computer'. Right click on the drive you wish to set and select 'properties'. Choose the autoplay tab. Use the dropdown box to see the various recognized types of CD and choose appropriate actions for them.


3. Creating a desktop shortcut for locking your pc !

If you use your computer in an area where others may have access to it, and there are things on your system you would rather have kept confidential, locking your desktop when you leave the computer is an essential task. Here's a recipe for a desktop shortcut that will lock your computer in two easy clicks:

Right click on an empty area of the desktop and choose 'new' then 'shortcut.' The create shortcut wizard will open; in the first text box, type '%windir%\System32\rundll32.exe user32.dll,LockWorkStation' and then give your shortcut an appropriate name on the next page, and hit 'finish.'

You will notice that the shortcut you created has a blank icon. To select a more appropriate one, right click on the shortcut and hit 'properties.' In the 'shortcut' tab, click the 'change icon' button.

In the 'look for icons in this file' box, type '%SystemRoot%\system32\SHELL32.dll' then click 'ok' to see a range of icons for your new shortcut. Choose an appropriate icon. Your desktop locking shortcut is now ready for use. Test it out.


4. Creating Shutdown Icon or One Click Shutdown:

Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path.
Use this path in "Type Location of the Item"
SHUTDOWN -s -t 01
If the C: drive is not your local hard drive, then replace "C" with the correct letter of the hard drive. Click the "Next" button. Name the shortcut and click the "Finish" button. Now whenever you want to shut down, just click on this shortcut and you’re done.


5. Removing Shared Documents folder From My Computer

Open registry editor by going to Start then Run and entering regedit. Once in registry, navigate to key

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders

You must see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this key, you have effectively removed the my shared documents folder.


6. Renaming The Recycle Bin icon:

To change the name of the Recycle Bin desktop icon, click Start then goto Run, write Regedit and press Enter. It opens Registry Editor. Now in Registry Editor go to:

HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}
and change the name "Recycle Bin" to whatever you want (don’t type any quotes).


7. Force windows XP to reboot upon crashing

This registry edit will cause your system to reboot itself automatically upon crashing. This can be useful if you have a reason for keeping your system on 24/7:

Open REGEDIT

Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM
\CurrentControlSet\Control\CrashControl'

Edit the 'AutoReboot' value to '1'


8. Locking the desktop

If you are leaving your computer for a while and do not wish to turn it off, but want to assure that no-one else can use the computer while you are away, locking the desktop is the best option.

By pressing WINDOWSKEY+L, you password protect your system just as if you had logged out or restarted the computer. The advantage is that any programs or processes that were running when you locked the desktop will stay open and running in the background, ready for you to resume work or play.


Windows XP is like a big ocean of tips and tricks. In the coming days I will add more and more Windows XP tips, tricks and hacks to this article.

How To Login in Windows XP After Password Forgot


So you forgot your Windows XP password? Don't worry - it happens to the best of us.
Here is a simple way to access Windows XP with Administrator rights and privileges if you have password protected your User account on your Windows XP system and can't remember the password(s) to login. Let's start:

1. Start your PC and come to Login Screen

2. Press CTRL+ALT+DELETE twice or thrice. It will open a new type of "LOGIN" Screen

3. In that screen type "administrator". In "username" and "password" type nothing if password is not set, otherwise enter the password known by you.

4. Login and change your password


If u don't know any password or username:

1. Start your PC and press "space bar" many times till safe mode option appear.

2. When "SAFEMODE" appears enter your system through safe mode, and it will directly lead u to enter without any passwords

3. Go to username and reset your password.

Hope you'll find this tutorial useful.


How to Track Your Stolen Laptop


My friend recently bought a Toshiba laptop, but it was stolen within a couple days. The good thing is that i had installed a tracing software on his laptop the very same day he bought it, and he had no troubles finding it. This can happen to anyone which is using laptop, so having a tracing software installed on your laptop is not a bad idea.

Here i am showing you a free laptop tracing software called Prey.

Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use. And it just works.


How it Works?

Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.

This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.

Notice: This file is Trojan as detected by some antivirus, but the thing is every such files are called trojan, as the process is to Track your system and view your systems reports. But be secure, this file is not harmful for your system or for your personal information. This software is made By PRey Project Company, and they take responsibility of it.

How to Download and Install Prey?

1. First of all download Prey project file from here.

2. After Downloading, Install the File and than

- They will ask for either standalone and +control panel.
- Go for +control panel, and than Click For New User.
- Give Your Name, Your Email and select Password to login the site.

E.g, Name :- John Smith
Email:-johnsmith@gmail.com
Password:-123456 (any Password that you choose) for Entering the site, and than press ok.

- You will get Email from prey project, just activate your account there, and click your device and do the following settings:

Click on the images to see the full size

If you "on" any of the above settings than be sure to remember password of "lock pass". It will show as the tym you make it on. Just below the lock it will be written pass, and when alert is on the message will display whenever you login, "this laptop is stolen ...."-lol

So these were all steps now you can install and get secure. Now if its get stolen than you can track back

Remember:
 This still has demerit E.g, If theif formats your system completly than its no way possible to get back than to ask for police, and they don't track laptop normally, until the stolen system is related with some serious case.


Lock Your Computer With USB Flash Drive


Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers?

Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.

This trick will work on on all versions of windows including both windows 32 bit and 64 bit

Here is the Trick to lock Your Computer With Usb Using Predator

1. Download predator software by clicking here.

2. Predator will get launched automatically after completing installation if not you can run it from Start/Programs/Predator

3. Now Insert your Usb. You will get a message to define your new password (This process will not format your pendrive and your pendrive data will not be affected by this at all)



4. Click on Ok and Enter your your new password in next dialog box

5. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter from the dropdown list

6. Finally click on Create Key button and then on OK button



After this the software will automatically exit.Now restart the program by clicking the icon on desktop.

Predator will take few seconds for initialization. Once the icon in the taskbar turns green then your software has initialized itself.