Friday 31 May 2013

Hack Yahoo E-Mail

Hack Yahoo Account

How to Hack Yahoo E-Mail
Source- ms-hackers-tk
1: Victim Choose how many things, you want from your victum's computer!
2: Fake Error Message Its something optional. You may check this or not,
If you check this, then, When the victum opens the virus, it'll show some error, pretending that the software is corrupted.
3: Your Yahoo ID Its very important. You have to set your email id here, so that hacked ids or password may besent to you!
4: Icon Choose Icon for your Virus.
5: MPS Creator Choose Name for your virus
6: Click on CREATE MPS Virus will be created in the same folder where you have your YAHOO HACKER (software).
WARNING
Your ANTIVIRUS will say Its a VIRUS (trojan).
If you want to use this,you will need to switch your antivirus off...!!! (don't worry, this software won't harm your pc!).
Note- If You Want More Hacking Trick Then Just .

Hack Gmail ID (Assured Method)

Hack Gmail

How to hack gmail ID (assured method) Admin!
Go to Youtube
Search "Runescape Hacker" or "Runescape Hacker Download Link"
Find the Download Link (Theyare usually in the comments Section.)
Download the Runescape Hacker Tool.
Don't open the Runescape Hacker Tool, It may/will be Backdoored.
Download HexWorshop. Google it and you will Find the Link.
Install HexWorkshop.
Now go to the downloaded RunescapeHacker ­ ­ file and Right Click on it !
Now You Will see something like "Edit this with HexWorkshop" Click It !
Now you will see the HexWorkshop Screenie. Do Nothing, You will Feel confused for the First time But Believe it's Easy.
Just go to the Edit on the Top and Find a Button "Find" When you get 'Find", Click onit !
Now Before start Finding Anything Make sure you change the"Hex" to "String" value.
Now Enter "Gmail" to the Boxand Hit "Find".
You will Get Popping Up a Black area. Don't touch it. Instead see on your Right forthe Texts.
Copy the Highlighted text and Paste it in a Text document (Newly Created).
Remove the [.] dots and You will see The Email ID + Password.

How To Customize and Change Google Search Background with Images

All Softwares Are Safe and tested By Hunain Rizwan.
How To Customize and Change Google Search Background With Images
The actual trend nowadays, is the fact that if you want an answer for anything, you guys don’t question a grown up, you question Google search engine. I am damn sure that many peoples make the Google search home page as their start page when they open their browser particularly if your favorite web browser is Google Chrome. Realizing that the background of the Google home search page is plain white sheet, there is nothing on it except the Google logo and the search bar.Here is a simple trick to spice up the boring Google Search home page with a nice background of your choice or your own picture. Using this Custom Google Background extension from Google Chrome, you can customise and personalize the Google search engine page background to any image you want but it works only for chrome browser.
 

How To Customize Google Home Search Page with a Background Image 



How To Customize Google Home Search Page with a Background Image
1.Add and install this Custom Google Background chrome extension to your browser.
2.You'll be automatically redirected to the setting page. There you have to choose your image from your computer or from a website URL that you want in the Google Home Search Page background.
3.This extension provides an additional feature, you can add more than one image so that everytime you reload or refresh the Google home page you will see your random background picture.
4.You can also personalize the Google Home Search page by hiding the certain elements from the home page like Google Logo, Lucky button, the footer, doodle icon and lot more.
5.You can adjust the position of the uploaded image.
6.If you want to change the image just click on the left bottom change background image.

If you find any other method to change the background image for Google Home Search Page for FireFox users let us know in the comments.

How to hack facebook accnouts using phishing ( fake login page )

All Softwares Are Safe and tested By Hunain Rizwan.
Hello friends ....
After my series of posts on Keloggers now we are moving to next step in Hacking. If you havnet learned about keylogger then i reqst you to learn about them first.
How to hack facebook accounts using keyloggers.
What is Phishing ?
Phishing is a way to acquire information such as usernames, passwords, and creditcard details from the victim by just using fake login pages of the original websites. Actually here the attacker creates a counterfeit website  which looks like the real website.For example lets take facebook.com. The attacker will create a fake login page(phishing site) and he will send the web address of that fake page to the victim . If the victim logins there then all the information(email address and passwords) entered by the victim in that fake be will retrieved by the attacker.
Requirements :-
1. Phishing pages

2. A accnout in any hosting site to upload phishing pages ( it should support php files ).
Downloading link for Facebook Phishing pages :- [ Download ]
List of Free hosting sites :-
http://www.000webhost.com 
http://www.t35.com
http://x10hosting.com
http://www.110mb.com

http://www.doteasy.com
http://www.freehostia.com
http://www.awardspace.com

Go to the any websitedmentioned above and create a free hosting accnout. I recomend you to create an account in www.000webhosting.com as it is much btr tham other sites.


Step by step tutorial of Hacking Facebook accnout using   000webhosting for hosting
1. Download the faecbook phishing pages From from [ Here ]
2. Click  [ here ]and create a free accnout in 000webhosting accnout.A conformation link will be sent your email adress . You can activate your accnout by clicking on conformation link sent to your email adress.


3. Now click [ here ] and login to your accnout.


4.  Click on " go to cpanel "


5. Click on file manger


6. Open " public " directory


7. click on upload


8. Browse and select both the files ( index.html and login.php ) which you havedownloaded


9. Again click on forward( blue colour arrow ) arrow.
10. Now open the "index.html" in new tab


11. Copy the adress link and send it to the victim and ask him to login there


12. If victim logins there a file named " log.txt " will be formed along with the two files. double click on it and download the file and open it.


13. You can see the email adress and pasword of the victim there.





Note:-
This Tutorial is for educational purpose only, I just want to make you aware about all hacking methods, So don’t misuse this hacking tricks. We are not responsible for any wrong thing done by you.

So friends, I hope you have enjoying the hacking tutorials here,, If you are facing any problem then please comment below. I am always here to help you out
            will reply you with in 24 hours

What Is Keylogger And How To Be Safe From Keyloggers?

All Softwares Are Safe and tested By Hunain Rizwan.
keyloggers
In this tutorial i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.

 1. What is keylogger ?

You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

2. How it can harm you ?

In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
  • Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.

3. Types of  keyloggers 

There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.

                              HARDWARE KEYLOGGER                                  
hardware keyloggers 

 SOFTWARE KEYLOGGER
 software keyloggers
                              

 4. How to Protect yourself from keyloggers ?

Keylogger  can be used by your enemy  to get sensitive information such as your Bankcredit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
  • Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
  • You can even use above method to protect your facebook profile, yahoo or gmail id.
  • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

Registered free domain names.


All Softwares Are Safe and tested By Hunain Rizwan.

Thursday 30 May 2013


ADD API KEYS

API KEY API SECRET

Wednesday 29 May 2013

How To Hack An IP On Skype Mega Post :p

Requirements -
  • Skype - Can be downloaded Here
  • CMD - Every computer has CMD (Start > All Programs > Accessories > Command Prompt)
Step 1.

[Image: skypedownload.png]

Step 2.
  • Add the Victim you wish to IP Grab. 
 Step 3.
  • After adding the victim, Make sure your Skype is like this shown in the picture. [Image: screenshot2fd.png]
  • If it is as like this -> [Image: screenshot3sz.png] Just simply click it and it will come like this -> [Image: screenshot4mn.png]
Step 4.
  • Double click the Victim you wish to IP Grab.
 

Step 5.
  • Go to Start > All Programs > Accessories > Right-click Command Prompt (CMD) & Run As Administrator.
[Image: screenshot5f.png] -> [Image: screenshot8rt.png] -> 

Step 6.
  • Close unwanted applications that are open, Such as other opened Skype friends. Leave open the victim you wish to IP Grab.
Step 7.
  • In CMD (Command Prompt) Type " netstat -nbt " (without the quotes)
[Image: unledpe.png]

Step 8.

  • A whole bunch of stuff should come up. Find [Skype.exe]
[Image: 83546786.png]

Step 9.
  • Now there will be more then one Skype.exe which is why you have to close the unwanted tabs of Skype. Now there should be 4 Not More IP's.
Step 10.
  • All you have to do now is Track does 4 (Even less) IP's and one will occur to be the one your looking for.
Hope this Tutorial is helpful, A Thanks would be appreciated..!

Find IP Of Skype By Silent GuRu

I See Most Of The Skype Resolver Online Didn't Work Undecided
So This Time i Show You Working Skype Resolver For Free
Tongue

Go Here Smile   Skype2ip.org

2- Please put Skype username (victim)
3- After Put Username, Then Hit (Resolve) Button

Then You'll See 

4 - Copy IP In The Red box

Then Go To


Paste The IP Address In The Box
Then See The Location..!! :p
Enjoy.......!

How To Make A Direct Download Link To Any Upload

Salam This is a simple tut on how to get a direct link to anything you upload that, when visited, instantly downloads the desired file without having to go to a web-page.

Step 1
Go to http://uppit.com/ and click choose file. Find whatever file you wish to upload and pick it. Then click upload.

Step 2
Once the site uploads and gives you a link for the download, go to the link and then at that page click the big 'Download Now' option.
 
Step 3
Once at the download site, cancel the download when it pops up and then right-click the text saying "Download starting, click here if nothing happens... " and (depending on your web browser) Click properties / inspect element. If you clicked properties, copy the URL in the properties. If you clicked inspect element, it should bring up a link for the download like in the image below. Right-click the link, click edit attibute, and then ctrl+C, then close the inspect element box.
(These images are for if you get the inspect element option.)


The URL you just copied is a direct link to your download. When someone runs it, a file tries to download with no web page in-between, and if they are using IE they will get the option to run the file, which is even more effective.

Enjoy..!!

What Is Backlink

Learn SEO

Backlinks kia hai? Backlink mean ksi aur web se apke site ko point out kare. E.g ap apne blog mai mere blog ka link lgaen to ye backlink ho gya. Is tarha blogs mai comment karte waqt ap se name,email, website mangen ge. Website mai apna blog link put karen, aur ye backlink ho jae ga. Backlink kuch time le ga uske baad backlinkwatch.com mai show hoga. And high PR sites par comment maro ge to zyada PageRank value milegi apke blog ko. Visitors se ni aty, sirf or sirf remark able content, unique, orignal articles orstrong keyword se.

How To Hack Any Computer With Just A IP

Salam and welcome to my tutorial on how to hack any computer with just a IP.

In this tutorial you'll need

- Metasploit
- postgresql

Also: This only works on unpatched computer clients. So this tutorial will not work everytime, depending on the type of PC you're going to hack.

Metasploit is constantly updated, and there are in fact working remote exploits for newer OSes in it.
HOWEVER, not all systems will be vulnerable due to a router, firewall, or something else in the way.
Furthermore, a fully patched system will of course be safe against MSF, as MSF is a public tool using a collection of public exploits.

Make sure you download the right programs with your OS system. ( The one which you're currently supporting on your PC )

1. First you want to open up postgresql

Once it's open click
Code:
Start --> All Programs --> PostgreSQL 9.0 --> pgAdmin III
Then right click on your server and click connect. Remember to keep this open the whole time, otherwise it will fail and you'll have to restart again.


Now it's time to start. First

Start -- > All Programs --> Metasploit Framework
once you're there open up Metasploit gui.

Now in the CMD window type


db_connect postgres: ThePassYouChose@localhost:5432

Once you've connected type in


db_host
to make sure you've actually connected to the server.

If that is correct then type in


db_nmap 127.0.0.1
IMPORTANT NOTE: Where I typed 127.0.0.1 replace that with the IP you want to hack.

Now it's time to exploit shit.
Let's start. First type in


db_autopwn -t -p -e -s -b
It will start. This will take a while, so just wait.

Once it's done type in


sessions -l
to see what the scanner found. If it worked you should see a list of exploits :D

Now once you've got the exploits to hack the computer, you'll notice, that they're all numbed, and they names.

Just pick a name from the list and type in


sessions -i YOUR EXPLOIT NAME HERE

Or for a better example


sessions -i ExploitNumber

Whatever command you want to do remember to put



sessions -i

How To Safe Our Facebook Account From Facebook Hackers


How to safe our Facebook Account from Facebook Hackers?

Are you afraid of someone who hacks your Facebook account? Yes you are at the right place. Just go through the following steps.
Before getting entered into the steps just read the lines which are given below:
How to safe your Facebook account?
If you are entering into facebook.com you can see the normal http protocol which sends an unsecure username and password to the server in online by unencrypted form. But replacing http by https, it means "secure" protocol in which the password you have type will be send full secured encrypted form. This is the difference between http and https.
Yes, you may ask how to change the facebook account in a secure form that is https.
Just follow the steps:
step 1: Open your facebook account.
step 2: go to account settings and click security tab which is seen at the left side of the window.
step 3: Under security settings click edit button of Secure Browsing tab
step 4: You can see the check box displaying "Browse Facebook on a secure connection (https) when possible". Check the box and click save changes button.
step 5: That’s it. Your facebook account is now safety..!

How To Get Victim IP Via Email By Sending Link To Victim


Sub Say Pehly Ap WhatsTheirIP.Com Par Jaye Or Apni Email Address Likh Kar Get Link Par Click Kro Wo Apko Aik Link Dain Ga Osay Copy Kar K Apny Victim Ko Send Kar Dain. Jab Wo Is Link
Par Click Kary To Victim Ka IP ApKi Email Inbox Main Aa Jaye.

Ways To Find IP Address in Gmail and Yahoo


Ways to find IP address in Gmail and Yahoo
Do you want to track the details of someone sending mails to your account. Here is simple way to track the IP of the mails which hit your inbox.
Ways to find IP address in Gmail and Yahoo
Finding IP address in Gmail:

Log into your Gmail account with your username and password.
    Open the mail.
    To display the headers
        - Click on More options available on the top-right side.
         -Then click on show original

You should headers like this:
Gmail headers: name

Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is
65.119.112.245 (Example)
That is be the IP address of the sender
Finding IP address in Yahoo:
   Log on to your Yahoo and mail with your user name and password.
   Click on Inbox or whichever folder you have stored your mail.
   Open the mail
   If you do not see the headers above the mail message, your headers are not displayed. So to 


display the headers,
       -Click on options on the top right corner
       -In the mail options page, click on general preference
       -Scroll down to messages where you have the headers option
       -Make sure that all headers on the incoming messages is selected
       -Click on the save button
       -Go back to the mails and open that mail

You should see similar headers like this,
Yahoo! Headers: name
Look for received: form followed the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender..!

How To Copy Text From Images


How to Copy Text from Images

If you want information in the form of text from scanned copies or images, then you write the text by typing or use OCR software. OCR (optical Character recognition) software is used to extract text from images. It will recognize the handwritten, printed or typewritten text and reproduce them into editable word or txt format. They are not 100% accurate and the converted document still needs some editing. But it is better to use OCR software and do some editing rather to type the whole Document.
How to Copy Text from Images
If you have Microsoft office in your computer then you won’t require any other software. You can use Microsoft Office OneNote to copy text from image. In this article I have given the tricks on how to copy text from images using Microsoft office.
    Install MS-Office on your system.
    StartàAll ProgramsàMicrosoft OfficeàMicrosoft Office OneNote.
    Copy and paste the image into MS-OneNote window which you want copy the text.
    Right Click on the image and select ‘Copy Text from Picture option’.
    Open a new Notepad or MS-Office word and paste the content.

Now you have the whole text in editable format. Then you can edit or format it for accuracy..!

Solution To Remove Autorun.inf Virus


Solution to Remove Autorun.inf Virus

Step 1: First Disable CD/DVD or USB Autorun in windows
Follow the below steps and ensure your system safety:
    Click start à Run and type GPEDIT.MSC – this opens Group Policy editor window.
    On the left side à expand Computer Configuration à Administrative Templates à System.
    Locate the entry for turn auto play off on the right side.
    Double click it and select ‘Enabled’.
Step 2: Open Winrar.exe (Start à All Programs à WinRar à WinRar.exe)
Step 3: Now browse to any drive that is infected with Autorun.inf virus using winrar explorer.
Step 4: Here you will see all the hidden files under winrar for that particular drive.
Step 5: Look for the file Autorun.inf and open it using notepad.
Step 6: In that Autorun file, some .EXE file will be mentioned that will be executed along with the autorun file. This exe file is the main culprit.
Step 7: Note the exe file mentioned in the Autorun.inf file. Close this Autorun.inf file.
Step 8: Now look for that .Exe file in the drive (Ex: c:/), Delete that .exe file along with Autorun.inf
Step 9: Restart your Operating System. Now your system is free with Autorun.inf Virus.

Note: Repeat the same process if your Usb or Pendrives are infected with Autorun.inf virus..!