Wednesday, 25 April 2012

How To Hack Remote Computer Usuing IP Address

cybercrime How to hack remote computer using IP Address

 Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.

Monday, 23 April 2012

How To Find SomeOne's Facebook Profile ID


          I Have Posted Alot About Facebook Hacking Tips And Tricks.Here Is An Other Facebook Trick     Its Really Amazing And Cool You Guyz Have To Try It.




Sunday, 22 April 2012

Cross Site Scripting(XSS) Complete Tutorial for Beginners - Web Application Vulnerability

 
What is XSS?
Cross Site Scripting also known as XSS , is one of the most common web appliction vulnerability that allows an attacker to run his own client side scripts(especially Javascript) into web pages viewed by other users. In a typical XSS attack, a hacker inject his malicious javascript code in the legitimate website . When a user visit the infected or a specially-crafted link , it will execute the malicious javascript. A successfully exploited XSS vulnerability will allow attackers to do phishing attacks, steal accounts and even worms.


Example :Let us imagine, a hacker has discovered XSS vulnerability in Gmail and inject malicious script. When a user visit the site, it will execute the malicious script. The malicious code can be used to redirect users to fake gmail page or capture cookies. Using this stolen cookies, he can login into your account and change password.

Saturday, 14 April 2012

Remote File Inclusion (RFI) | Website Hacking

Before starting this tutorial, I would like to tell you about a piece of code called as  shell. There are many shells available . Lets consider a shell known as c99 shell. First download it from here.
Now signup for a account on any free web hosting site . Say 110mb.com.  Now sign into your account,go to Filemanager, upload some files and then upload c99 shell here. Now just log out and visit the URL of  shell you uploaded.


http://username.110mb.com/shell.php
and you would find that you can manage all your directories and files without logging in your account,that is without entering your password anywhere.

Both images are showing the filemanager, In Ist I am accesing by signing into my account and 2nd just by accessing shell without logging into.

The Onion Routing - Highly Anonymous

We all many times use proxies for staying anonymous on internet.





 Lets quickly check out , what we are actually doing while using proxies. We first connect to a proxy server which brings resources requested by us from the web server.
                                                          
Thus a proxy server hides our identity  by acting as an intermediary between us and the web server that we are accessing. You might want to read detailed post on proxies here.

Windows Logon Password - How Crackers Work

Cracking windows logon password is not so difficult. You can get many offline password crackers  which could change/clear the existing password (like offline nt password and registry editor) or cracks the existing password (like oph crack). Just download their ISO images ,burn them,insert to CD ROM and then things are simply self explainatory. I am writing this post to make you clear that how actually these password crackers work. 




Okay when you set windows logon password, it is obviously stored in a file somewhere in windows.
The password is stored in SAM file placed in %systemroot%\system32\config  (like C:\windows\system32\config).
Now why we just dont try to open SAM and see all stored passwords. Okay lets do it, go to C:\windows\system32\config and open SAM. You must get an error that " it is in use by some another application". Actually we cant open SAM file when windows is running . Even if anyhow we manage to access the content of SAM file, we won't get the passwords in clear text but they are encrypted.

SQL INJECTION | Website Deface |

What is SQL injection ?

SQL stands for Structured Query Language.SQL is used to design the databses. The information is stored in databses. SQL injection is the vulnerability occuring in database layer of application which allow attacker to see the contents stored in database. This vulnerabilty occures when the user's input is not filtered or improperly filtered.


The main goal of attacker is use to access the information stored in website's database. It can be done manually, read more here. In this tutorial, I am using to do the same thing easily using a tool.


Read the disclaimer first before proceeding. I remind you again that its only for educational purposes.


Requirement: Download the tool from here.  Its SqliHelperV.2.1.


Steps of attack :-


Vulnerable Website > Database > Tables > Columns > Data


 Search for any vulnerable website using Google Dorks. I found this website
http://www.shelter.org/org/news.php?id=5

Metasploit Tutorial

--- The Metasploit Framework ---


Note: This is an advance topic.Read Carefully. Feel free to ask any kind of queries . We are always here to help you.

If you are really interested in network security, chances are you must have heard of the Metasploit over the last few years.
Now, have you ever wondered what someone can do to your PC, by just knowing your IP. Here's the answer. He could 0wN you, or in other words , he could have full access to your PC provided you have just a few security loopholes which may arise cause of even a simple reason like not updating your Flash player last week, when it prompted you to do so.
Metasploit is a hacker's best friend, mainly cause it makes the job of exploitation and post-exploitation a lot easier compared to other traditional methods of hacking.
The topic Metasploit is very vast in itself.However, i'll try keeping it basic and simple so that it could be understood by everyone here. Also, Metasploit can be used with several other tools such as NMap or Nessus (all these tools are present in Backtrack ).
In this tutorial, i'll be teaching you how to exploit a system using a meterpreter payload and start a keylogger on the victim's machine.

Hacking through Metasploit is done in 3 simple steps: Point, Click, 0wn.

Hack Email / Computer With Pro Rat





Hack any e-mail account password
1First of all Download Pro Rat Here http://adf.ly/7Or3C

Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2Open up the program. You should see the following:

 

Thursday, 12 April 2012

Online IP Stealer

Today I'm going to show you "How to get the IP of your Victim".The topic might scare you but its quite easy to be frank! You might often be using some kind of software or sometimes might even buys....but its all a waste in front of this Tutorial !



What is an IP ?

An IP (Internet Protocol) is something which can be used to find out the Computer's Location...Its like an address to the Computer with which a Hacker or even a lay man can be traced to his House.In short it is an address to a Computer location just like your House Address !

So now you will realize the Importance of an IP and finding out the IP...its like removing the clothes of a PC

New Way Of Hacking Facebook Account

Here is one more interesting tip on how to hack a Facebook account by the method of reverting the password.This method does not involve any skill or anything just a brain would be enough to get you through this trick ! Well,you might think that it is impossible but it is actually true that you can hack any facebook account ! So before we start i would like to tell you what "Reverting" actually means...





What is Reverting ?

Reverting is the process of resetting a password without the knowledge of the actual user ! So this is basically a low level of hacking but it does the job for you !

New Facebook Hacker 2012

Hi Guys! I know its been long time since i posted simple but useful hacks.Today is one such one which I'm sure it will be your favorite.My earlier programs were efficient but they were not so comfortable!This program is the best thing you can ever image because all you have to do is install and check for inbox everyday for the hacked emails! Don't beleive me ?Then you gotta check this article! This trick again uses simple scripting but just a better level of it!



The process which I'm going to use is called Phishing.Which you would have heard quite a lot of times if you have been on my blog for quite a lot of times. 

Hack Facebook | Facebook Hacking Software
Facebook Phishing Page
5 Ways to Hack Facebook Password

 Before we start of with how to install and how to use it I'll just tell you a little about Phishing.

How To Delete Any Facebook Account

Recently i posted a tutorial on "Hack Someone's Facebook.So this post is similar to the previous one but much more destructive than it.In this article I will be telling you how to lock/delete your friend's Facebook Account.This tricks has been recently tested by me and is confirmed to be 100% working !




What you will be needing ?

1.Victim's Profile Link - ex.http://www.facebook.com/profile.php?id=112741086148511
2.Victim's Email - Which is being used to log into his Facebook Account.
3.Victim's Birthday - Can be found out easily if you know the victim personally or you can use social engineering to get the password !