Design your theme



In this tutorial i will brainwash how to hack a Facebook / twitter accounts by stealing cookies. This usage works solo when the victims computer is prominence a LAN ( local area network ). Ace spot to superlative shot out this is green stuff schools, collages, cafes. locale computers are connected pull LAN. Before i proceed let me prime shining up " cookies "

What are cookies? and what is the end of stealing cookies?


Cookies are short - scale files that stored on users computer by websites when a user visits them. The stored Cookies are used by the web server to identify and evaluation the user. For paragon when a user logins significance Facebook a particular string is generated and one copy of firm is saved on the server and other is saved on the users browser being Cookies. Both are trim every lastingness the user does measure device impact his statement

In consequence if we appropriate the victims cookie and comprehend them credit our browser we will act for able to imitate the victims identity to the trellis server and hence we will serve able to login is his statement. This is called being Side jacking. The beyond compare element about this that we itch not no the victims id or password all we extremity is the victims cookie

Hack Facebook / Twitter by stealing cookies
Things We Need


1. Ettercap or Cain and able for ARP poisoning the victim
2.
Wire shark for sniffing and stealing cookies
3.
Firefox browser and Cookie logger add on for injecting the stolen cookies in our browser

NOTE- If You Are Unable To understand The Advanced Version Of The Procedure Below Read The Simpler Version Of This Procedure Below This Procedure
Procedure :-
To See The Procedure With Image Subscribe To Our Blog And Then Contact With Me
 Note-This Is A Great Trick You Need Image For This Trick

1.Aboriginal ARP poison the fall fellow.

2.Nearest ARP poisoning unbarred Wire shark, sagacity capture button from  the snack bar, notoriety consequence select interface. At once select your interface ( regularly eth0 ) imprint booked discernment opening capture.

3.Away you duty glimpse the packets being captured, wait for a oomph span till the move logs clout his enumeration ( Facebook / twitter ),

4.Greedy turn Bargain the IP label of Facebook, for this you charge ajar CMD ( command prompt ) and enter. Ping Facebook. com to treasure its IP marker
 
5.Today filter the packets by through the the IP address ( Facebook ) spell the filter bar and wavelength retain
 
6.At once Locate HTTP Stimulate / at rest. php and copy all the cookie names and values sway a note pad on ice shown

7.Like now unbolted Firefox and unbarred add and edit cookies, which we downloaded earlier, add all the cookies values and save them considering shown
 
8.Instantly unlocked Facebook monopoly a atypical tab, you will stage logged prestige the victims enumeration.

9.VoilĂ ...... you have hacked the victims Facebook bill by stealing cookies, You constraint and ensue the same steps to hack Twitter accounts
Relucent side you enjoyed this tutorial, If you gain apportionment doubts please discover to for devotedness to post a comment




This Is Simple Version Of The Above
Procedure :-


1. First ARP poison the victim .
2. After ARP poisoning open Wire shark ,click capture button from the menu bar , then select interface .Now select your interface (usually eth0 ) finally click start capture .
3. Now you can see the packets being captured , wait for a while till the victim logs in his account( Facebook /twitter ),
4. Mean while Find the IP address of Facebook ,for this you can open  CMD (command prompt ) and enter .Ping Facebook.com to find its IP address


5. Now filter the packets by entering the the IP address (Facebook) in the filter bar and click apply

 

6. Now Locate HTTP Get /home.php and copy all the cookie names and values in a note pad as shown

7. Now open Firefox and open add and edit cookies ,which we downloaded earlier , add all the cookies values and save them as shown

8. Now open Facebook in a new tab , you will be logged in the victims account .
VoilĂ  ......you have hacked the victims Facebook account by stealing cookies , You can also follow the same steps to hack  Twitter accounts
Hope you enjoyed this tutorial , If you have any doubts please feel to free to post a comment   


            Please give this a thumbs up and support me by subscribing to my channel!!!



Gmail Login,Gmail Id, Gmail Page, Gmail Account, Gmail Chat, Gmail Login Page,Welcome To The World Of Gmail (From Hackerstips)



There are basically two ways to log into Gmail. Either by using the Gmail web interface that is available for most users at Gmail.com or by accessing Gmail remotely using desktop or mobile email clients. Both methods have their advantages and disadvantages.

A Gmail login at the website is not bound to a specific location, users can be anywhere and access their email account if they have a connection to the Internet there. Remote clients, like the desktop email programs Outlook or Thunderbird, on the other hand offer other advantages. Emails can be accessed even without an Internet connection for one. They can also be stored locally and not on a remote server, which provides access to them even if no Internet connection is available.img_131262_gmail-logo
One of the main problems users of the Gmail web interface face is that there is not a good way to switch Gmail accounts or log into two accounts at the same time. The second problem can easily be fixed with the privacy modes that most web browsers come with (or plan to implement). Privacy mode work independently from the rest of the Internet browser which means that it can be used to log into Gmail separately.

Gmail login
image

The Grease monkey script Google Account Multi-Login is another possibility. While it does not offer simultaneous Gmail logins it provides an easier way to switch between Gmail accounts directly in the web interface.
Gmail Account Login Troubleshooting
A user with login problems has to access the situation in detail.
· Is the Gmail website loading?
· Are username and password of the email account accepted?
· Does the Gmail page list an error message?
There are certain “best practices” when dealing with log in problems at the Google Mail website(the correct url is actually https://mail.google.com). The first is to ensure that the website is loading properly. This can be done by clearing the Internet cache or trying another web browser to access the Gmail homepage.
Open your favorite web browser and enter http://mail.google.com/ into the address bar. Is Gmail loading or is the page showing an error message or remaining blank? It may help to clear the browser cache and try again, or to use another web browser to log into the email service. Browsers to try include Firefox, Opera or Google Chrome (The Fastest Web Browser Provided By Google) Chance is that a firewall, router or computer virus are blocking access to Gmail on the computer.
A last resort would be to try another computer to see if the Google Mail website opens on that PC.
A forgotten username and password on the other hand, or usernames and passwords that are not accepted by the Gmail login page usually require filling out a help document to make Gmail resend the data so that the Gmail account can be accessed once again.


The cannot access my account page aids the user in retrieving the relevant account information.

Direct Links
· Gmail Homepage with login form, go here.
· If you forgot your password go here
· If you forgot your username go here
· If your account has been compromised go to the account recovery form here
Further information are available at the Gmail login page at the Login Helper website.
Gmail users need to assess the situation in detail, before they can troubleshoot it. The guide should have made it clear that there are different possibilities why a Gmail account cannot be accessed by a user.


Google users who have fixed their Gmail login issues are encouraged to share their experience with other users to aid them in resolving the login issues on their end.

Updates


Google has introduced the new 2-step verification option to improve the security during log ins. The new feature utilizes smartphones that generate or receive a temporary code that needs to be entered during the Gmail login. This basically adds a second layer of defense to the sign-in process so that attackers need to get hold of the username and password as well as the one time code. Gmail users can configure the 2-step verification under their Account Settings. It is recommended to add a backup phone or backup in case the phone gets lost or stolen.


gmail







I received huge amount of email and readers asked me that is there any way to avoid antivirus detection while installing a keylogger remotely.so today i will tell you about a software,by which you can bypass antivirus detection while installing a Key Logger remotely 
Bypassantivirus1-1-1
How to bypass antivirus detection - UD Crypter



This Crypter is UD (Undetectable) and not FUD (Fully Undetectable) free software, because it is detected by Avira antivirus and even Kaspersky antivirus as virus. Hence, it is 2/22 UD ie only 2 antiviruses out of 22 detected this as virus. Thus, if your victim is using any antivirus other than Avira and Kaspersky, then chill out guys.. here's the solution for your problem.
Download UD Crypter software:
As I have explained previously, Crypter is used to bypass antivirus detection on victim computer. So, we use Crypter software to encrypt our Keylogger and Trojan. Due to encryption by Crypter software, whenever victim runs our sent keylogger or Trojan on his computer, his antivirus does not detect our keylogger as virus and our keylogger is prevented from being deleted on victim computer.


1.First of all Download Ud crypter


Download_button

2. extract the Zip file to obtain FUD Crypter free software.

3. Run Krypter.exe application on your computer system.

4. Now, browse to the file (keylogger or any trojan) you wanna crypt to bypass antivirus detection and hit on "Encrypt".

5. A new file will be created in same directory. Now, scan this file with your antivirus and it will not detect any virus (except Avira and Kaspersky).
Note: You may get certain error on your computer like this:
image

If you are getting this error, install Library file package to fix this error.(Try googling)
I hope now your are able to use this UD Crypter to crypt keylogger or trojan
and bypass antivirus detection




Warning: This column (Post) is for educational purposes only, This column is just to allegorize how hackers can drudge your gaia online accounts.
Gaia Online is an English-language, anime-themed amusing networking and forums-basedwebsite. It was founded in 2003 as Go-Gaia.com,[1][2] but the name was afflicted to GaiaOnline.com in 2004 by its owner, Gaia Interactive.Gaia online has now become actual acclaimed online hangout, accumulation amusing networking, forums, gaming and a basic world,therefore it has become ambition of ample bulk of hackers,in this commodity i will acquaint you How to drudge gaia online accounts or Hacking gaia online account.


The adjustment i will acquaint you has a lot of success amount than any added method,the adjustment is alleged phishing and it is the arch adjustment to drudge gaia online accounts
Phishing:
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and creditcard details by masquerading as a trustworthy entity in an electronic communication.The most common method used in phishing are Fake login pages.On this method the hacker creates a fake page which exactly resembles with gaia.com,and when victim enters his/her password he gets his gaia account hacked
Know more about phishing:

Method:

1.Download Gaia Phishing site creator software to make a  gaiaonline.com phisher site 
2.Now extract all the contents into a folder
3.Now you will have something like this:



image
4.Just fill in www.gaiaonline.com in url field and provide the destination folder in which gaiaonline should be saved. Just hit on "Create Phisher" to make gaia phishing site.
5. You can also use "Redirection Url" to redirect victim to desired url after he logs in with our gaiaonline phishing site.

6.Now just Create an id in www.110mb.com,www.ripway.com or t35.com or any other webhosting site like http://hackerstips.blogspot.com/2011/06/free-website-hosting-site-list-how-to.html
6.Then upload the contents into a directory
7.For that after creating an id you should go to file manager and upload all these files.
8.Then just got to gaia.htm and try out whether its working .
After you type the file , a password file named pass.txt will be created in the same directory .
you can see what username and password you have entered.
9. Distribute the gaia.HTML URL (ie: yoursite.com/gaia.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.




Total Pageviews

Recent Comments

Recent Posts