Design your theme

I Have Written Many Post On How To Hack Facebook Password Via Phishing |Create Fake Login Page And Facebook Hacking Corner
                      …………………………………………………..But……………………………………………………………


Yesterday when i was surfing on the net i came across an interesting script kidy tool Facebook Freezer  Actually this tool is not used for hacking Facebook but it is simply used to prevent users from logging into Facebook sounds cool ?
Follow the instructions given below to prevent your friends , from logging into their Facebook account
image
Concept Behind The Hack: -
Facebook has a security attribute mastery which touching 25 or thence logins the bill is temporarily hobbling, to enable the report the report innkeeper must reset his / her account
Thus, even when victim tries to login his Facebook account using correct password, he is not able to login to his Facebook account, thus you can hack Facebook account thanks to Facebook Freezer.

Hack Facebook Accounts With Facebook Freezer :-


1. Frist a fall Download Facebook Freezer

Download_button
2. Now extract the files into a folder
3. Now run Facebook Freezer. exe file as shown
image
4. Now enter the email id of the victim whose Facebook account you want to hack using Facebook freezer and finally hit " Freeze ".

5. That ' s it. You will now be able to hack Facebook account using this Facebook freezer. This freezing will continue until you hit " Stop Freezing ". This will not hack Facebook account for you but it will prevent the victim from logging into his, her account,


Note: - If you want to hack Your friends Facebook Password Via phishing. You can have a look at my article How to hack Facebook account using A Phisher

      For further doubts and clarifications please pass your comments




In this tutorial i will brainwash how to hack a Facebook / twitter accounts by stealing cookies. This usage works solo when the victims computer is prominence a LAN ( local area network ). Ace spot to superlative shot out this is green stuff schools, collages, cafes. locale computers are connected pull LAN. Before i proceed let me prime shining up " cookies "

What are cookies? and what is the end of stealing cookies?


Cookies are short - scale files that stored on users computer by websites when a user visits them. The stored Cookies are used by the web server to identify and evaluation the user. For paragon when a user logins significance Facebook a particular string is generated and one copy of firm is saved on the server and other is saved on the users browser being Cookies. Both are trim every lastingness the user does measure device impact his statement

In consequence if we appropriate the victims cookie and comprehend them credit our browser we will act for able to imitate the victims identity to the trellis server and hence we will serve able to login is his statement. This is called being Side jacking. The beyond compare element about this that we itch not no the victims id or password all we extremity is the victims cookie

Hack Facebook / Twitter by stealing cookies
Things We Need


1. Ettercap or Cain and able for ARP poisoning the victim
2.
Wire shark for sniffing and stealing cookies
3.
Firefox browser and Cookie logger add on for injecting the stolen cookies in our browser

NOTE- If You Are Unable To understand The Advanced Version Of The Procedure Below Read The Simpler Version Of This Procedure Below This Procedure
Procedure :-
To See The Procedure With Image Subscribe To Our Blog And Then Contact With Me
 Note-This Is A Great Trick You Need Image For This Trick

1.Aboriginal ARP poison the fall fellow.

2.Nearest ARP poisoning unbarred Wire shark, sagacity capture button from  the snack bar, notoriety consequence select interface. At once select your interface ( regularly eth0 ) imprint booked discernment opening capture.

3.Away you duty glimpse the packets being captured, wait for a oomph span till the move logs clout his enumeration ( Facebook / twitter ),

4.Greedy turn Bargain the IP label of Facebook, for this you charge ajar CMD ( command prompt ) and enter. Ping Facebook. com to treasure its IP marker
 
5.Today filter the packets by through the the IP address ( Facebook ) spell the filter bar and wavelength retain
 
6.At once Locate HTTP Stimulate / at rest. php and copy all the cookie names and values sway a note pad on ice shown

7.Like now unbolted Firefox and unbarred add and edit cookies, which we downloaded earlier, add all the cookies values and save them considering shown
 
8.Instantly unlocked Facebook monopoly a atypical tab, you will stage logged prestige the victims enumeration.

9.VoilĂ ...... you have hacked the victims Facebook bill by stealing cookies, You constraint and ensue the same steps to hack Twitter accounts
Relucent side you enjoyed this tutorial, If you gain apportionment doubts please discover to for devotedness to post a comment




This Is Simple Version Of The Above
Procedure :-


1. First ARP poison the victim .
2. After ARP poisoning open Wire shark ,click capture button from the menu bar , then select interface .Now select your interface (usually eth0 ) finally click start capture .
3. Now you can see the packets being captured , wait for a while till the victim logs in his account( Facebook /twitter ),
4. Mean while Find the IP address of Facebook ,for this you can open  CMD (command prompt ) and enter .Ping Facebook.com to find its IP address


5. Now filter the packets by entering the the IP address (Facebook) in the filter bar and click apply

 

6. Now Locate HTTP Get /home.php and copy all the cookie names and values in a note pad as shown

7. Now open Firefox and open add and edit cookies ,which we downloaded earlier , add all the cookies values and save them as shown

8. Now open Facebook in a new tab , you will be logged in the victims account .
VoilĂ  ......you have hacked the victims Facebook account by stealing cookies , You can also follow the same steps to hack  Twitter accounts
Hope you enjoyed this tutorial , If you have any doubts please feel to free to post a comment   


            Please give this a thumbs up and support me by subscribing to my channel!!!



Gmail Login,Gmail Id, Gmail Page, Gmail Account, Gmail Chat, Gmail Login Page,Welcome To The World Of Gmail (From Hackerstips)



There are basically two ways to log into Gmail. Either by using the Gmail web interface that is available for most users at Gmail.com or by accessing Gmail remotely using desktop or mobile email clients. Both methods have their advantages and disadvantages.

A Gmail login at the website is not bound to a specific location, users can be anywhere and access their email account if they have a connection to the Internet there. Remote clients, like the desktop email programs Outlook or Thunderbird, on the other hand offer other advantages. Emails can be accessed even without an Internet connection for one. They can also be stored locally and not on a remote server, which provides access to them even if no Internet connection is available.img_131262_gmail-logo
One of the main problems users of the Gmail web interface face is that there is not a good way to switch Gmail accounts or log into two accounts at the same time. The second problem can easily be fixed with the privacy modes that most web browsers come with (or plan to implement). Privacy mode work independently from the rest of the Internet browser which means that it can be used to log into Gmail separately.

Gmail login
image

The Grease monkey script Google Account Multi-Login is another possibility. While it does not offer simultaneous Gmail logins it provides an easier way to switch between Gmail accounts directly in the web interface.
Gmail Account Login Troubleshooting
A user with login problems has to access the situation in detail.
· Is the Gmail website loading?
· Are username and password of the email account accepted?
· Does the Gmail page list an error message?
There are certain “best practices” when dealing with log in problems at the Google Mail website(the correct url is actually https://mail.google.com). The first is to ensure that the website is loading properly. This can be done by clearing the Internet cache or trying another web browser to access the Gmail homepage.
Open your favorite web browser and enter http://mail.google.com/ into the address bar. Is Gmail loading or is the page showing an error message or remaining blank? It may help to clear the browser cache and try again, or to use another web browser to log into the email service. Browsers to try include Firefox, Opera or Google Chrome (The Fastest Web Browser Provided By Google) Chance is that a firewall, router or computer virus are blocking access to Gmail on the computer.
A last resort would be to try another computer to see if the Google Mail website opens on that PC.
A forgotten username and password on the other hand, or usernames and passwords that are not accepted by the Gmail login page usually require filling out a help document to make Gmail resend the data so that the Gmail account can be accessed once again.


The cannot access my account page aids the user in retrieving the relevant account information.

Direct Links
· Gmail Homepage with login form, go here.
· If you forgot your password go here
· If you forgot your username go here
· If your account has been compromised go to the account recovery form here
Further information are available at the Gmail login page at the Login Helper website.
Gmail users need to assess the situation in detail, before they can troubleshoot it. The guide should have made it clear that there are different possibilities why a Gmail account cannot be accessed by a user.


Google users who have fixed their Gmail login issues are encouraged to share their experience with other users to aid them in resolving the login issues on their end.

Updates


Google has introduced the new 2-step verification option to improve the security during log ins. The new feature utilizes smartphones that generate or receive a temporary code that needs to be entered during the Gmail login. This basically adds a second layer of defense to the sign-in process so that attackers need to get hold of the username and password as well as the one time code. Gmail users can configure the 2-step verification under their Account Settings. It is recommended to add a backup phone or backup in case the phone gets lost or stolen.


gmail







I received huge amount of email and readers asked me that is there any way to avoid antivirus detection while installing a keylogger remotely.so today i will tell you about a software,by which you can bypass antivirus detection while installing a Key Logger remotely 
Bypassantivirus1-1-1
How to bypass antivirus detection - UD Crypter



This Crypter is UD (Undetectable) and not FUD (Fully Undetectable) free software, because it is detected by Avira antivirus and even Kaspersky antivirus as virus. Hence, it is 2/22 UD ie only 2 antiviruses out of 22 detected this as virus. Thus, if your victim is using any antivirus other than Avira and Kaspersky, then chill out guys.. here's the solution for your problem.
Download UD Crypter software:
As I have explained previously, Crypter is used to bypass antivirus detection on victim computer. So, we use Crypter software to encrypt our Keylogger and Trojan. Due to encryption by Crypter software, whenever victim runs our sent keylogger or Trojan on his computer, his antivirus does not detect our keylogger as virus and our keylogger is prevented from being deleted on victim computer.


1.First of all Download Ud crypter


Download_button

2. extract the Zip file to obtain FUD Crypter free software.

3. Run Krypter.exe application on your computer system.

4. Now, browse to the file (keylogger or any trojan) you wanna crypt to bypass antivirus detection and hit on "Encrypt".

5. A new file will be created in same directory. Now, scan this file with your antivirus and it will not detect any virus (except Avira and Kaspersky).
Note: You may get certain error on your computer like this:
image

If you are getting this error, install Library file package to fix this error.(Try googling)
I hope now your are able to use this UD Crypter to crypt keylogger or trojan
and bypass antivirus detection




Total Pageviews

Recent Comments

Recent Posts