Sunday, 11 November 2012
Friday, 31 August 2012
How To Send Messages From Any Facebook Account To Any Other
Using this method you can send messages on facebook from any account to any other account.
For Video Tutorial : Click Here
You need to follow these few steps :
1. Download a php script : Click Here
2. Upload this php script to any webhosting site like 000webhost.com (make sure to upload it in public_html folder)
3.Then open your domain that you choose while signing up and you will see something like this :
4. Then click on the emailspoofer.php file and will see an application like this :
5. In Spoofed Email:
Enter the email id of the person from where you want to send the message.
In Target Email:
Enter the username which is present on the URL of the user's profile page and add "@facebook.com" in the end. (example : "abc@facebook.com")
In Reply Email:
Enter "Message Title:"
In Message Title and Message Body:
Enter anything u want
6. Click on Submit .
For Video Tutorial : Click Here
You need to follow these few steps :
1. Download a php script : Click Here
2. Upload this php script to any webhosting site like 000webhost.com (make sure to upload it in public_html folder)
3.Then open your domain that you choose while signing up and you will see something like this :
4. Then click on the emailspoofer.php file and will see an application like this :
5. In Spoofed Email:
Enter the email id of the person from where you want to send the message.
In Target Email:
Enter the username which is present on the URL of the user's profile page and add "@facebook.com" in the end. (example : "abc@facebook.com")
In Reply Email:
Enter "Message Title:"
In Message Title and Message Body:
Enter anything u want
6. Click on Submit .
Obama signs Emergency Internet Control
President Obama adds that it is necessary for the government to be able to reach anyone in the country during situations it considers critical, writing, “Such communications must be possible under all circumstances to ensure national security, effectively manage emergencies and improve national resilience.” Later the president explains that such could be done by establishing a “joint industry-Government center that is capable of assisting in the initiation, coordination, restoration and reconstitution of NS/EP [national security and emergency preparedness] communications services or facilities under all conditions of emerging threats, crisis or emergency.”
But Section 5.2 has raised alarm among those who fear the government will have too much control over the Web. The section explained how the secretary of homeland security - currently Janet Napolitano - will 'satisfy priority communications requirements through the use of commercial, Government, and privately owned communications resources, when appropriate.'
White House officials have acted quickly to ease concern, insisting the order is just an update of an existing authority dating back to 1984 . The claim the government has been granted no extra powers.
10 Notepad Funny and Amazing Tricks
1. If you are using a guest account and run is disabled you can use notepad to open regedit and cmd'
open notepad and type command.com and save it as cmd.bat this batch file will open command prompt.
if you cant open regedit by run open notepad type regedit and save it as regedit.bat double click on this and regedit window will open.
2. Use notepad to abort shutdown -Open notepad and type shutdown -a and save it as shutdown.bat.next time when your computer is about to shutdown double click on this bat file. for other cmd commands open command prompt and type shutdown a and press enter.
3. Open notepad and type shutdown -r 10 and save as restart.bat this will restart your computer in 10 seconds if you want to use this for fun paste this file in system 32 and see. computer will restart in every 10 second.
4. How to know your friend's ip when chatting on a messenger. suppose you are using g-talk. ask your friend for a good wallpaper you have downloaded. send to him .Now open your cmd and type Netstat -n
5. Open Notepad.
Type “BUSH HID THE FACTS” or “this app can break” (without quotes).
Save that file with any name and close it.
Open It Again to see the magic.
6. Open Notepad.
Type .LOG (in capital letters) and hit enter.
Save it with any name and close it.
Open it again.
When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.
7. Open Notepad.
Copy the code give below in the notepad file:
X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Save it with an .exe extension like testvirus.exe
As soon as you save this file, your anti virus program will detect the file (virus) immediately and will attempt to delete it. If this happens then your Antivirus is working properly. If not, then its time to look for some other reliable program.
8. Open Notepad.
Copy the below mentioned text in your notepad file:
@echo off
color 02
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start
Save the file with .bat extension like Matrix.bat
Thats it. Just open the file to see the matrix effect right before your eyes!
9. Open Notepad type the following code :
start
start.bat
and save that file as start.bat
then it will open a window continuously and your system will hang :D
10. As you might be knowing that the flight number of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence or something else but whatever it is, it does startle us.
Open Notepad.
Type “Q33N” (without quotes) in capital letters.
Increase the font size to 72.
Change the Font to Wingdings.
You will be amazed by the findings.
Thursday, 30 August 2012
Backtrack SET Credential Harvester Attack (Phishing)
Backtrack Credential Harvester Attack (PHISHING)
For Video Tutorial - Click Here
Requirements for doing this Attack :
1. Backtrack
2. Social Engineering Toolkit(SET)
3. A Brain
HOW TO :
1. Open your Backtrack OS and open SET
2. Select Social Engineering Attacks
3. Select Website Attack Vectors
4. Select Credential Harvester Attack Method
5. Select Site Cloner
6. Enter the URL of website you want to clone ( ex- www.facebook.com , www.gmail.com, etc )
7. Enter your IP address (192.168.x.x)
8. Hit Enter
9. Now anyone who go to your ip address will be redirected to your cloned site
10. Now the main thing is to convince the victim to click on link for that you must use you social engineering skills.
My Advice : - Use a URL Shortner ...adfly is best... sign up on this - Click Here
11. Now shorten your URL and send it to victim , then if victim clicks on your link he will be redirected to your Cloned Site and the username/password he enters will show in your BT screen.
12. Enjoy Hacking :D
NOTE - This only work if both attacker and victim are on same network(LAN)
For using it on WAN you must know some concepts and logic of port forwarding
See this video - Click Here
THIS IS FOR EDUCATIONAL PURPOSE ONLY
For Video Tutorial - Click Here
Requirements for doing this Attack :
1. Backtrack
2. Social Engineering Toolkit(SET)
3. A Brain
HOW TO :
1. Open your Backtrack OS and open SET
2. Select Social Engineering Attacks
3. Select Website Attack Vectors
6. Enter the URL of website you want to clone ( ex- www.facebook.com , www.gmail.com, etc )
7. Enter your IP address (192.168.x.x)
8. Hit Enter
9. Now anyone who go to your ip address will be redirected to your cloned site
10. Now the main thing is to convince the victim to click on link for that you must use you social engineering skills.
My Advice : - Use a URL Shortner ...adfly is best... sign up on this - Click Here
11. Now shorten your URL and send it to victim , then if victim clicks on your link he will be redirected to your Cloned Site and the username/password he enters will show in your BT screen.
NOTE - This only work if both attacker and victim are on same network(LAN)
For using it on WAN you must know some concepts and logic of port forwarding
See this video - Click Here
THIS IS FOR EDUCATIONAL PURPOSE ONLY
Games For Windows Live Free Product Keys
Games For Windows Live Free Product Keys !!!
If you want to see the video tutorial : Click Here
Register - Click Here
Keys - Click Here
If u r not a poland citizen then do this and then go to Keys Link
change your proxy to this :
proxy - 178.218.226.70:8080
OR
88.156.71.247:8080
OR
Any Poland Proxy
Click on the Kane and Lynch : Dead Men Game (LOGO)
Check your Email
Wooo you got the working key
This key works for many GFWL i tried it on these :
Batman Arkham Asylum
GTA 4
Dirt 2
Resident Evil 5
Bioshock 2
Street Fighter 4
Kane & Lynch Dead Men
Quantum Of Solace
Star Wars
Warhammer
etc
Try on other games also and comment if it works ...
If you want to see the video tutorial : Click Here
Register - Click Here
Keys - Click Here
If u r not a poland citizen then do this and then go to Keys Link
change your proxy to this :
proxy - 178.218.226.70:8080
OR
88.156.71.247:8080
OR
Any Poland Proxy
Click on the Kane and Lynch : Dead Men Game (LOGO)
Check your Email
Wooo you got the working key
This key works for many GFWL i tried it on these :
Batman Arkham Asylum
GTA 4
Dirt 2
Resident Evil 5
Bioshock 2
Street Fighter 4
Kane & Lynch Dead Men
Quantum Of Solace
Star Wars
Warhammer
etc
Try on other games also and comment if it works ...
Wednesday, 29 August 2012
ProRat How to use and Configure Full Guide
Trojan Horse : ProRat How to use and Configure Full Guide
For Video Tutorial : Click Here
Requirements :
1. Prorat- Click here to download Trojan Prorat.
2. Hostname - Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always automatically keep pointing to your changing IP. Follow these steps -:
1. Log On to www.no-ip.com and register for an account.
2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.
3. Downloading and install their DNS update client available here http://www.no-ip.com/downloads.php Run it and enter your credentials. Update your host name and save it.
4. Lets check whether your IP has been associate with chosen host name or not. Go to command prompt and type 'ping yourhostname' (without quotes) , hopefully it should reply with your IP address.
For Video Tutorial : Click Here
Requirements :
1. Prorat- Click here to download Trojan Prorat.
2. Hostname - Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always automatically keep pointing to your changing IP. Follow these steps -:
1. Log On to www.no-ip.com and register for an account.
2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.
3. Downloading and install their DNS update client available here http://www.no-ip.com/downloads.php Run it and enter your credentials. Update your host name and save it.
4. Lets check whether your IP has been associate with chosen host name or not. Go to command prompt and type 'ping yourhostname' (without quotes) , hopefully it should reply with your IP address.
Tutorial for configuring Trojan :
1. Open prorat.exe that you have downloaded.
2. Click on Create and then Create ProRat Server
3. Enter your host name in the ProRat Notification field as shown. Uncheck all other options.
4. Click on general settings Tab and have a look at server port,password, victim name. Remember these things.Check out and configure other options as per your need. You can bind server.exe with any genuine file, change its icon etc.
5. Finally click on create server and now its ready to be sent to victim. Once victim installs it, it would automatically disable antivirus/firewall
What after victim has run the server part ?
1.Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.
2.You will start listening to connections, I mean you will get a notification as shown when victim would be online.
This is for Education Purpose Only ...
Leave Thanks in comments if you like the post
Cross Platform Trojan Steals Linux and MAC OS X Passwords
Russian anti-virus company Doctor Web reported about the first cross-platform backdoor to run under Linux and Mac OS X identified as "BackDoor.Wirenet.1". This malicious program designed to steals passwords entered by the user in Opera, Firefox, Chrome, and Chromium, and passwords stored by such applications as Thunderbird, SeaMonkey, and Pidgin.
BackDoor.Wirenet.1 is the first-ever Trojan that can simultaneously work on these operating systems. BackDoor.Wirenet.1 is still under investigation.
At launch BackDoor.Wirenet.1 creates a copy in the user's home directory. To interact with the command server located at 212.7.208.65, the malware uses a special encryption algorithm Advanced Encryption Standard (AES). BackDoor.
Subscribe to:
Posts (Atom)