Wednesday 7 August 2013


A password attack that does not attempt to decrypt any information, but continue to try different passwords. For example, a brute-force attack may have a dictionary of all words or a listing of commonly used passwords. To gain access to an account using a brute-force attack, a program tries all available words it has to gain access to the account. Another type of brute-force attack is a program that runs through all letters or letters and numbers until it gets a match. - See more at: http://hackw0rm.blogspot.in/2013/01/how-to-do-hydra-brute-force-attack-to.html#sthash.yGLai07D.

How to do Brute force or (Dictionary Attack)


So here we are going to use Backtrack 5, Hydra Attack. I will use fake                      G-mail a/c for this tutorial.


Requirements.#sthash.yGLai07D.

Backtrack 4 or 5 with Internet connection

 Password.txt file (That contains Possible passwords)  

 Brain.

I took fake ID of G-mail ( as my victim it's password is '521478963', 

and Suppose i know the possibilities of password so,
 I will make password.txt file to do brute force attack like this >







Now it's time to start attack using Hydra gtk.
Go to > Application > Backtrack > Privilege Escalation > Password Attacks > Online Attacks > hydra-gtk.





And it will start like this >








Fill all info in this way :-



* Single Target  = smtp.gmail.com

* Port          =    465 
* Protocol    =    smtp
* mark        =   Use SSl, Be Verbose, Show Attempts




fter setting your Target, go on Password tab >



Fill all info in this way !!

* Username        =  G-mail  ID (hackerseven5@gmail.com)
* Password list   =    upload your possibilites password file 
(save your password.txt file on desktop)




After all go to > Start Tab and Clik on Start.

So, your Brute Force Attack has been started :-


How to do Hydra (Brute force Attack) to hack

 any E-mail Password







After all it will try Brute force attack using every password and try to login  
with possibilities password, if you were lucky !! then it will show successful message like this.




I no using this attack it is very hard to hack any G-mail Password, but it can help you to recover your hacked ID or forget password. - 

Friday 2 August 2013



How To Change UR

IP:-







1. Click on "Start" in the bottom left hand corner of screen


2. Click on "Run"


3. Type in "cmd" and hit ok You should now be at an MSDOS prompt

screen.

4. Type "ipconfig /release" just like that, and hit "enter"


5. Type "exit" and leave the prompt


6. Right-click on "Network Places" or "My Network Places" on your
desktop.


7. Click on "properties
You should now be on a screen with something titled "Local Area
Connection", or something close to that, and, if you have a network
hooked up, all of your other networks.


8. Right click on "Local Area Connection" and click "properties"


9. Double-click on the "Internet Protocol (TCP/IP)" from the list under
the "General" tab


10. Click on "Use the following IP address" under the "General" tab


11. Create an IP address (It doesn't matter what it is. I just type 1 and 2
until i fill the area up).


12. Press "Tab" and it should automatically fill in the "Subnet Mask"
section with default numbers.


13. Hit the "Ok" button here


14. Hit the "Ok" button again


You should now be back to the "Local Area Connection" screen.


15. Right-click back on "Local Area Connection" and go to properties
again.


16. Go back to the "TCP/IP" settings


17. This time, select "Obtain an IP address automatically" tongue.gif


18. Hit "Ok"


19. Hit "Ok" again


20. You now have a new IP address

How To Hack Sites

Using Havji:


Note : Only For Educational Purpose.>!!!

Just Follow these easy steps :-


1. First download havij from here
http://itsecteam.com/


2. Run Havij SQL Injection software and copy and paste vulnerable website link


3. Now click in the “Analyze” Button


4. Then It shows some messages there. Be alert on it and be show patience for
sometime to find it’s vulernable and type of injection and if db server is
mysql and it will find database name.Then after get it’s database is name like
xxxx_xxxx


5. Then Move to another operation to find tables by clicking “tables” as figure
shown. Now click “Get tables” Then wait some time if needed


6. After founded the tables ,you can see there will be “users” Put mark on it
and click in the ” get columns ” tab


7. In that Just put mark username and password and click “Get data”


8. Finallyyou got now username and password of the admin…

Thursday 1 August 2013

 Hack Administrator

Password in Window XP :-



Just follow steps below.

1) Download Cain & Abel v2.0 from www.oxid.it and install it.
2)Start Cain
3)Click on Cracker tab , on the left choose LM & NTLM Hashes and click on + sign
icon on toolbar then Dump NT Hashes from Local machine





4) Now you will see





5) After this will appear windows accounts , right click on account you want to
break password and choose type of attack , in this example I chose brute force
attack. Brute force actually means to start with a letter a and encrypting it. Then
see if the encrypted strings match. If not then b, c,.. until we‘ve gotten to admin.
Then the encrypted strings will match and we‘ll know that is the right password.
Brute force attack is the slowest method of cracking, but there is no risk that
you‘ll not find the password. The thing about brute force is that the time of
cracking rises rapidly depending on how long the password is, how many
characters are being used in it and so forth.



 make Ur Videos look

Like Action Movie:





Convert Ur Ordinary Videos To Action Movie By Using Ultimate FX
Studio....=D
With Ultimate Special Fx you can turn your ordinary video recorded
from your phone camera into a stunning, action movie clips. Developed
by TechCat Mobiles developers, Ultimate Special FX provides the users to
add various visual effects to the video is been recorded through your
phone camera. Users can add missile pods, air destruction, flying cars,
dinosaurs invasion rolling on to your camera screen.
To begin with, tap the Start button on the app’s homescreen.
Select one of the three available scenes (it seems more effects will be
added soon), and tap Action!to launch the recording screen. Tap the red
button at the bottom to begin recording.
As per the app’s instructions, try to record a video clip of at least 5
seconds. While recording, keep your hands as steady as possible, with
the cross hair in the viewfinder kept on the object that you wish to apply
the effect on.
Tapping the red button once again will stop the recording, and you’ll be
taken to another screen from where you can specify the exact point in
the video where you want the effect to appear by dragging the slider at
the to select the preferred position within the clip. Once done, tap OK,
wait for the app to go through the rendering process, and voila! You now

have your very own Hollywood-grade action sequence








Hacking Yahoo:

Messenger For Multiple AccountLogin:



a)Open Registry Editor (regedit.exe) Click Start > Run and then type 'regedit'press enter.

b) Then Look For- HKEY_CURRENT_ USER\Software\yahoo\ pager\Test.

c) Then change this value of plural to like this- ―Plural‖=dword: 00000001

Tuesday 30 July 2013

Hacking FB Accounts  Using Tabnapping :



  • Note : Only For Educational Propose..!!!

Tab Napping: Tab Napping is new hacking trick through which you can't directly hack account
and you will be using phishing method with tab napping then you can hack account. Actually
Tab Napping is a script which you put into a site/blog and when the user visit your website/blog
and read your article or play game or watch video, when user goto other tab in browser which
contain other website like youtube,google etc and came back to your website then your
website will be redirected to the phishing page and telling them to login with
facebook/gmail/yahoo account to continue.When user enter login information he/she will be
back to your page and user password will be send to you.

So lets see how to hack facebook account using tab napping trick.

Steps:
1) First of all you have a web hosting (website) and if you don't have your own website then
create Free website with following website :



www.000webhost.com
www.host1free.com
www.my3gb.com


or you can search on google and create an account.


2) Now download the script and phishing pages from here:

http://www.mediafire.com/?0zrp565h8v90jbe


3) Extract it and you will see the files and folders like below:









4) Upload all the files and folders to your website.
when you upload it's look like


5))The website contain a game and send your website address(your tab napping
website where you upload all the files) to your friend or anyone else whose
facebook account you want to hack and tell him/her that if your are intelligent or
smart or say anything else then play this game and win it.
The website look like this:










Actually the game is very dificult and he/she will not win in less time and he/she
will goto another tab in browser like facebook,google,youtube ,yahoo etc and
when he/she came back to the website , it will be automatically redirected and
saying them to login with facebook account to continue







Monday 15 July 2013


What is hacker?









During the 1960s, the word "hacker" grew to prominence describing a person with strong computer skills, an extensive understanding of how computer programs worked, and a driving curiosity about computer systems. Hacking, however, soon became nearly synonymous with illegal activity. While the first incidents of hacking dealt with breaking into phone systems, hackers also began diving into computer systems as technology advanced.





Hacking became increasingly problematic during the 1980s. As a result, the Computer Fraud and Abuse Act were created, imposing more severe punishments for those caught abusing computer systems. In the early 1980s, the Federal Bureau of Investigation (FBI) made one of its first arrests related to hacking. A Milwaukee-based group known as the 414s was accused of breaking into 60 different computer systems including the Memorial Sloan-Kettering Cancer Center and the Los Alamos National Laboratory. Later that decade, the infamous Kevin Mitnick was arrested and sentenced to one year in jail for damaging computers and stealing software. He was arrested again in 1995 for computer fraud and put in jail for hacking Motorola Inc., Sun Microsystems Inc., NEC Corp., and Novell Inc. to steal software, product plans, and data. Mitnick eventually cost the firms a total of roughly $80 million
Subscribe to RSS Feed Follow me on Twitter!