This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, 31 August 2012

Backtrack Wallpapers







How To Send Messages From Any Facebook Account To Any Other

Using this method you can send messages on facebook from any account to any other account.

For Video Tutorial : Click Here

You need to follow these few steps :

1. Download a php script : Click Here

2. Upload this php script to any webhosting site like 000webhost.com (make sure to upload it in public_html folder)

3.Then open your domain that you choose while signing up and you will see something like this :






4. Then click on the emailspoofer.php file and will see an application like this :





5. In Spoofed Email:
   
   Enter the email id of the person from where you want to send the message.

   In Target Email:

   Enter the username which is present on the URL of the user's profile page and add "@facebook.com" in the end. (example : "abc@facebook.com")

   In Reply Email:

   Enter "Message Title:"

   In Message Title and Message Body:

   Enter anything u want

6. Click on Submit .















Obama signs Emergency Internet Control




Barack Obama has signed an executive order that could hand control of the internet to the U.S. Government, in the event of a natural disaster or terrorist attack. "The federal government must have the ability to communicate at all times and under all circumstances to carry out its most critical and time sensitive missions," Obama said.

President Obama adds that it is necessary for the government to be able to reach anyone in the country during situations it considers critical, writing, “Such communications must be possible under all circumstances to ensure national security, effectively manage emergencies and improve national resilience.” Later the president explains that such could be done by establishing a “joint industry-Government center that is capable of assisting in the initiation, coordination, restoration and reconstitution of NS/EP [national security and emergency preparedness] communications services or facilities under all conditions of emerging threats, crisis or emergency.”

But Section 5.2 has raised alarm among those who fear the government will have too much control over the Web. The section explained how the secretary of homeland security - currently Janet Napolitano - will 'satisfy priority communications requirements through the use of commercial, Government, and privately owned communications resources, when appropriate.'

White House officials have acted quickly to ease concern, insisting the order is just an update of an existing authority dating back to 1984 . The claim the government has been granted no extra powers.

10 Notepad Funny and Amazing Tricks





1. If you are using a guest account and run is disabled you can use notepad to open regedit and cmd'
open notepad and type command.com and save it as cmd.bat this batch file will open command prompt.
if you cant open regedit by run open notepad type regedit and save it as regedit.bat double click on this and regedit window will open.


2. Use notepad to abort shutdown -Open notepad and type shutdown -a and save it as shutdown.bat.next time when your computer is about to shutdown double click on this bat file. for other cmd commands open command prompt and type shutdown a  and press enter.


3. Open notepad and type shutdown -r 10 and save as restart.bat this will restart your computer in 10 seconds if you want to use this for fun paste this file in system 32 and see. computer will restart in every 10 second.


4. How to know your friend's ip when chatting on a messenger. suppose you are using g-talk. ask your friend for a good wallpaper you have downloaded. send to him .Now open your cmd and type Netstat -n


5. Open Notepad.
Type “BUSH HID THE FACTS” or “this app can break” (without quotes).
Save that file with any name and close it.
Open It Again to see the magic.


6. Open Notepad.
Type .LOG (in capital letters) and hit enter.
Save it with any name and close it.
Open it again.
When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.


7. Open Notepad.
Copy the code give below in the notepad file:
X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Save it with an .exe extension like testvirus.exe
As soon as you save this file, your anti virus program will detect the file (virus) immediately and will attempt to delete it. If this happens then your Antivirus is working properly. If not, then its time to look for some other reliable program.


8. Open Notepad.
Copy the below mentioned text in your notepad file:


@echo off
color 02
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start


Save the file with .bat extension like Matrix.bat
Thats it. Just open the file to see the matrix effect right before your eyes!


9. Open Notepad type the following code :

   start
   start.bat

and save that file as start.bat

then it will open a window continuously and your system will hang :D


10. As you might be knowing that the flight number of the plane that had hit World Trade Center on                                             that dreadful day (9/11) was Q33NY. Now call this trick a coincidence  or something else but whatever it is, it does startle us.
Open Notepad.
Type “Q33N” (without quotes) in capital letters.
Increase the font size to 72.
Change the Font to Wingdings.
You will be amazed by the findings.





Thursday, 30 August 2012

Backtrack SET Credential Harvester Attack (Phishing)

Backtrack Credential Harvester Attack (PHISHING)

For Video Tutorial - Click Here

Requirements for doing this Attack :
1. Backtrack
2. Social Engineering Toolkit(SET)
3. A Brain


 HOW TO :


1. Open your Backtrack OS and open SET

2. Select Social Engineering Attacks

3. Select Website Attack Vectors







4. Select Credential Harvester Attack Method





5. Select Site Cloner





6. Enter the URL of website you want to clone ( ex- www.facebook.com , www.gmail.com, etc )





7. Enter your IP address (192.168.x.x)

8. Hit Enter

9. Now anyone who go to your ip address will be redirected to your cloned site





10. Now the main thing is to convince the victim to click on link for that you must use you social engineering skills.

My Advice : - Use a URL Shortner ...adfly is best... sign up on this - Click Here



11. Now shorten your URL and send it to victim , then if victim clicks on your link he will be redirected to your Cloned Site and the username/password he enters will show in your BT screen.











12. Enjoy Hacking :D

NOTE - This only work if both attacker and victim are on same network(LAN)
             For using it on WAN you must know some concepts and logic of port forwarding
             See this video - Click Here 

THIS IS FOR EDUCATIONAL PURPOSE ONLY 

Games For Windows Live Free Product Keys

Games For Windows Live Free Product Keys !!!





If you want to see the video tutorial : Click Here


Register -  Click Here


Keys -  Click Here


If u r not a poland citizen then do this and then go to Keys Link
change your proxy to this :
proxy - 178.218.226.70:8080
                    OR
            88.156.71.247:8080
                     OR
            Any Poland Proxy



Click on the Kane and Lynch : Dead Men Game (LOGO)


Check your Email

Wooo you got the working key


This key works for many GFWL i tried it on these :
Batman Arkham Asylum
GTA 4
Dirt 2
Resident Evil 5
Bioshock 2
Street Fighter 4
Kane & Lynch Dead Men
Quantum Of Solace
Star Wars
Warhammer
etc

Try on other games also and comment if it works ...








Wednesday, 29 August 2012

ProRat How to use and Configure Full Guide

Trojan Horse : ProRat How to use and Configure Full Guide



For Video Tutorial :  Click Here






Requirements :


1. Prorat- Click here to download Trojan Prorat.
2. Hostname  -  Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always automatically keep pointing to your changing IP. Follow these steps -:



1. Log On to www.no-ip.com and register for an account.

2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.





3. Downloading and install their DNS update client available here http://www.no-ip.com/downloads.php Run it and enter your credentials. Update your host name and save it.

4. Lets check whether your IP has been associate with chosen host name or not. Go to command prompt and type 'ping yourhostname' (without quotes) , hopefully it should reply with your IP address.



Tutorial for configuring Trojan :


1. Open prorat.exe that you have downloaded.
2. Click on Create  and then Create ProRat Server





3.  Enter your host name in the ProRat Notification field as shown. Uncheck all other options.





4. Click on general settings Tab and have a look at server port,password, victim name. Remember these things.Check out and configure other options as per your need. You can bind server.exe with any genuine file, change its icon etc.





5. Finally click on create  server and now its ready to be sent to victim.  Once victim installs it, it would automatically disable antivirus/firewall



What after victim has run the server part ?
1.Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.
2.You will start listening to connections, I mean you will get a notification as shown when victim would be online.







This is for Education Purpose Only ...




Leave Thanks in comments if you like the post







Cross Platform Trojan Steals Linux and MAC OS X Passwords


Russian anti-virus company Doctor Web reported about the first cross-platform backdoor to run under Linux and Mac OS X identified as "BackDoor.Wirenet.1". This malicious program designed to steals passwords entered by the user in Opera, Firefox, Chrome, and Chromium, and passwords stored by such applications as Thunderbird, SeaMonkey, and Pidgin.

BackDoor.Wirenet.1 is the first-ever Trojan that can simultaneously work on these operating systems. BackDoor.Wirenet.1 is still under investigation.

At launch BackDoor.Wirenet.1 creates a copy in the user's home directory. To interact with the command server located at 212.7.208.65, the malware uses a special encryption algorithm Advanced Encryption Standard (AES). BackDoor.

test Windows Hacking

test Windows Hacking

test Backtrack Hacking

test Backtrack Hacking 

Test Email Hacking

Test Email Hacking

test hacking tutorials

test hacking tutorials

test news

test news