Showing posts with label HACKING. Show all posts
Showing posts with label HACKING. Show all posts

Saturday 14 July 2012

Bluetooth Hacking : How To Hack Mobile Phones Via Bluetooth

Cellphone is a most popular technology with many good advantages and different disadvantages. So this is why it came under the list of hackers. As the popularity is growing more and more, hackers are also working hard on cellphone hacking. Nowadays 80% off the mobiles are having Bluetooth installed, which is used for transfering media like videos, pictures, docs. etc

In this article I would be sharing another good article on Bluetooth hacking. So through my instructions you can control your enemies mobile, when you are in same class or his/her bluetooth is nearer to you and is switched on.

Some Great Features:-

1) Read Messages.
2) Turn off the phone.
3) Listen Musics.
4) Select modes
5) Block Devices.
6) Contacts
7) Profile Change
8) Ringtone Change
9) Restore Factory Settings.
10) Mobile Restart
11) Volume
12) Make Calls

Easy Installation:-

1) Download It
2) Install it on your bluetooth supported device
3) Run it
4) It would restart the device.
5) Choose desired language
6) Choose Connection
7) search devices
8) Select your “victim”
9) Thats it
Now you can hack your victim!Password :- www.saqlainhacking.blogspot.com
Enjoy Hacking.....

Facebook Hacking : Hijack Accounts Using Firesheep Attack

Today is the day for hijacking facebook account. Many readers were asking me to make another article upon Hijacking Facebook accounts with Firesheep. What is a Firesheep? It is basically a new addon for new version of Firefox which hijacks accounts over unsecured wifi networks. It is used for sharing other network's cookies from packet data.

It was made for popular websites so they can easily operate their website in offices and agencies by sharing networks. So In this article i would like to show you how to hack your neighbor and friends facebook account.




Step1. Download the software from here.
Step2. Install it on your browser.
Step3. Start the capturing process and wait for 15mintues you would be able to see your neighbor live account.



As you can see above It hijacks live users near you home and connects them to your packet connection.
Enjoy Hacking.....

Cross Site Scripting ( XSS ) Web Application Penetration Tutorial - Website Hacking Part 2


Cross site scripting (XSS) used when a someones inputs malicious data into a website, which causes the program to do something it wasn’t intended to do. XSS attacks are very nowadays very popular and some of the largest websites have been affected by them including the FB, CNN, Paypal, Payza, Microsft, and Yahoo. Some sites features usually vulnerable to XSS attacks are:

• Search Engines
• Login Forms
• Comment Fields




Three Types of XSS attacks:


1).  Local XSS attacks are the most rearrest and dangerous malicious. This attack requires an exploit for any browser vulnerability. With this type of attack, the hacker can install backdoors, Trojans and worms onto your computer.

2).  Non-persistent attacks are usually used by hackers which are mostly harmless for the targeted website. Non-persistent attacks occur when ( scripting language that is used for client web develpoment) or HTML is inserted into a sufficient which causes users outputs to hackers file. These attacks are only activated when the user visits the malicious link.

3). Persistent attacks are mostly and 90% used against web applications/programs like PDF books, forums, and ads boxes and on online games. From this attack a hacker can do:

• Steal website cookies
• Stealers
• Creation of Worms

How Hackers Create Cross Site Scripting

 Hackers knowledgeable in Scripting/coding and PHP will be able to handle advanced XSS attacks to steal your cookies and spread worms to any targeted website, but to show you a simple and quick example of something more realistic then above, I have mentoned how hackers use cross site scripting XSS.
1). If a hacker wants to phish passwords from www.victim.com. If he was able to find an XSS vulnerability  he would be able to create a link pointing to the victims website that redirects to his phishing host.

2). when I inserted the script into the search box, a URL was formed that looked like the following:

3). In the link the hacker would then change everything in between these :-  ?searchbox= and &search with the following JavaScript code:

<script>window.location = “http://phishing-site.com”</script>

4). Now when you go to the finished url, the targeted site will redirect to the phishing website. Next He would encode the link to make it look more secure and less suspicious. You can encode the URL at http://www.encodeurl.com/.

5). My finished encoded URL is:
http%3A%2F%2Flocalhost%2Fform.php%3Fsearchbox%3D%3Cscript%3Ewindow.location+%3D+%5C%22http%3A%2F%2Fphishing-site.com%5C%22%3C%2Fscript%3E%26search%3Dsearch%21
6). Once the victim opnes that link points to the targeted website, he will be more likely to fall on the phishing page.

Enjoy Hacking....

Website Hacking : How To Find Vulnerability On Website ? Part 2

Today i will show you how hackers find Vulnerabilities of targeted websites. Hacker would take that information and search a numerous vulnerability databases for the exploit it may be malicious app. If there’s an exploit available, he will run it against the websites server and would take the whole complete control. If there isn’t any exploit, hacker would move onto another available port and try again on a different method.
Popular exploit databases are:

Milw0rm

SecurityFocus
osvdb





How to Find Vulnerabilities of Websites?

By searching “filezilla” on application milw0rm, the hacker would not find any exploits due to current version of the FTP program. Every hacker would move on to another available port to try and find another possible vulnerability attack, but this doesn’t mean professional hacker will do this thing. If a skillful hacker has given the opportunity, he may try to path a vulnerability in the current software version and will make an exploit for it. In every hacker's community, this new vulnerability attack would be called a “0-day”. These vulnerabilities are very important in the hacker community for some reasons.

1)  Nobody knows about the vulnerability, so the hacker could start cracking hundreds of websites before the vulnerability is patched.

2) Mostly some hackers sell the vulnerability for thousands of dollars to enemies of the targeted sites.

3)  Patching vulnerabilities and creating the exploit for it shows that hacker is very skillful and is the member of hacker community.

You might be confused why 0-days are worth so much.  I’ll explain it with a simple formulae.

Hackers + (0-Day )+ Agency Servers = Worst Reputation = Loss of Dollars

Now before we get into the actual hacking, I will discuss a some of the common type of attacks used against patched vulnerabilities.

Denial-of-Service (DoS)


 There are many types of DoS attacks, but they all have one concept: to make the target website server unavailable for users. The most common type of DoS attack is when the hacker sends a software full of malicious information to the  server causing it to use up all of its sources, and in return pushing it offline from the network, or causing it to deny requests from unknown users who are trying to reach the web.

Buffer Overflow (BoF)

This happens when an application attempts to store more data into a FTP buffer, or in a data storage area. Because the buffer was only meant to keep the particular amount/storage of data, the extra information overflows into other folders causing them to be removed with malicious scripting published by the hacker. Once the code is executed by the user, the hacker can receive each and every information and can access full control of the server.

Types of Exploits 


If you see the Milw0rm exploit database list, you will see that in many exploit  it reads local pc exploit or remote exploit.

Local Exploit – For running local exploit, you must first have access and control on the machine. Local exploits are usually used to control users to admin or root. In other words, it allows an ordinary user to gain admin role.

Remote Exploit – A remote exploit is as good exploit just roles the same thing as a local exploit except that what isn’t running  locally means admin access, but can be launched or run from anywhere across the internet.

A hacker mosly has to use a combination of both exploits remote and local exploits to gain full control of a system through websites.

Enjoy Hacking!

Internet Download Manager ( IDM ) 6.11 Full Version Serial Number Crack

Internet Download Manager ( IDM ) is a download accelator program. By using this software we are able download anything from the Internet at a high speed. But when we are download the program from its official site it is a trial version which is 30 day pack. After 30 days it will ask you to enter the  serial key or to buy license. So here is the process to make any latest downloaded Internet Download Manager full version. After doing these steps you would be able to access the full free version.
Here I will describe how can we make an latest IDM full version using some serial keys and adding some tricks. You can download the latest IDM from here.

              




How to Crack IDM Latest 


1. 
Download latest IDM from here and install it.
2. Goto to  "
C:\windows\System32\drivers\etc" on your computer.
3. In the "
etc" you will find a file with name "hosts"
4. right Click on host file and choose "
properties" and path to "security" tab on the property window.
5. Now goto "
Advanced" and Navigate to "owner" on the Advance Setting Option.
6. Goto 
"edit".
7. A Screen will display There you would be able to find a table asking you to change "
change Owner to". Now change it to any user ( not to administrative ).
8. Tick the tab "
replace owner on sub containers and objects".
9. Goto to settings.

10. apply all the modified setting. During this it would ask for permissions ignore
 the message and click OK.
11. Now Right click of mouse on the "
Hosts" file and choose "properties" then path to "security" tab.
12. Now press On "
Edit" on the  "Group or User Names" side.
13. A window will ask for the permission press full control

14. Apply these changes and press ok

15. Now open the "
Hosts" file with wordpad/notepad and Copy the below text and paste it in the hosts file.
127.0.0.1 tonec.com
127.0.0.1 www.tonec.com

127.0.0.1 registeridm.com

127.0.0.1 www.registeridm.com

127.0.0.1 secure.registeridm.com

127.0.0.1 internetdownloadmanager.com

127.0.0.1 www.internetdownloadmanager.com

127.0.0.1 secure.internetdownloadmanager.com

127.0.0.1 mirror.internetdownloadmanager.com

127.0.0.1 mirror2.internetdownloadmanager.com

16. Save the host file.

17. Now goto registration 

18. Now a screen Will be open ask your details and serial.
19. Enter your First name, Last , Email  in the required field.
20. In serial box type any of the below serial. And press ok.
RLDGN-OV9WU-5W589-6VZH1
HUDWE-UO689-6D27B-YM28M

UK3DV-E0MNW-MLQYX-GENA1

398ND-QNAGY-CMMZU-ZPI39

GZLJY-X50S3-0S20D-NFRF9

W3J5U-8U66N-D0B9M-54SLM

EC0Q6-QN7UH-5S3JB-YZMEK

UVQW0-X54FE-QW35Q-SNZF5

FJJTJ-J0FLF-QCVBK-A287M

Download From Here !
You Are Done, Enjoy Hacking....

How to Prevent Your Private Data From Password Cracking Attacks

There are many of thing you can do to prevent NetBIOS from cracking passwords attacks and to keep the privacy of your computer secured. In this Article, i would like to show you some of the quick ways in which you can keep the privacy of your computer safe. As many antivirus software doesn't alerts you from cracking attacks.
So, this is why I am going to teach you how to get secured from hackers when using Internet.




How Can I Prevent My Personal Data From Hackers?

1) Goto Start - Control Panel - Network Connections.
2) Double Click on your current active connection, in my case it is wireless network connection 2.
3) Right Click and go to properties.
4) If file & Printer sharing is active, then deselect it.

Thats it now you are secured. Enjoy Tips!

Hack Hotmail Account Password Using (FUD) Easylogger

In my past article, I mentioned some of the great features of Istealers password Stealer. So today i am gonna  show you how to hack hotmail password using simple and easy keylogger. This is a free ( FUD ) undetectable keylogger which works invisibly on victim's computer.

As we all know, keylogger is basically a hardware/software which records all the keystrokes of victim's keyboard, it also captures screenshot with date and timings.

After that it send's the log file to hacker's email ( means yours ).




Hack Hotmail Password


  First of all Download the keylogger :- Click Here

1) Run the Easylogger.exe File.



2) Now fill the Username with your gmail id and password with your own. You can set the time you want i have set 120 seconds this is normal. Hit build button!

3) Now you have to set the .exe file we have made in step 2, Now bind it with something like Mp3, Jpg, Png, VLC extension etc. For binding visit :- How to Bind Keylogger.

4) You are done, Now when victim will receive the file and will execute it, it would start working, capturing screenshots, keystrokes. etc and after some seconds you would be able to receive the logs just like in the picture below.


Enjoy Happy Hacking....

Hack Facebook AOL Paypal Accounts Using Super Phisher 2012

As in my previous articles i have mentioned many tips like hacking twitter account password, security issues, bypass antivirus detection and many different things. So today i am going to make another article on hacking Facebook Account using Super Phisher. Many readers are tired from getting the source code of login and making phishing resources. But today i will show you how to make any site phisher automatically.


How To Setup Super Phisher?

Step1
. Download From Here ( Password :- hackingguide )& Install it on your computer.
Step2. Your Internet Connection should be on.
Step3. Run the software.
Step4. Choose your own phishing site like facebook.com twitter.com paypal.com etc.
Step5. Name of password file should be password.txt, name of php must be login.php.
Step6. Site to redirect would be your choosen website like if you make facebook login page, you should redirect it to facebook.com.


Step7. Press Build Phisher Button, thats it. Now it will create the output files in C:drive.

Step8.  Upload Them to any free host or paid and get your victim's private data including emails & passwords.
Enjoy Cool Hacking...

Protesters Against Cell Phone Tracking Making Some Noise

The matter of cell phone tracking is a major concern to many people, and this is only amplified by the fact that it is being done without their consent and without a warrant. The points that are raised by those who are against this procedure include matters such as the fact that this is an invasion of privacy and more importantly if this procedure will even help or facilitate battling crime. Arguments from both those who are in favor and those who are not are strong. For example locating a vehicle through the use of GPS technology, without a warrant for the search, was banned by the U.S. government and now people are questioning why the same hasn’t been done about tracing people’s location through their cell phones. Their temper is fueled by the fact that cell phone tracking is something that legal authorities have been making use of for a while now in tracking people.



However some changes have been brought about to some degree, with the recent law suit charged by ACLU, law enforcing institution in the country have had to stop using cell phone tracking technologies, for the moment. Furthermore the Department of Justice has also taken into considerations the claims regarding privacy invasion. The department also stated that it will certainly act upon the matter raised by people regarding the breach in their privacy; however it can also be interpreted that this statement may only mean that the information that has been gathered about individuals through cell phone monitoring will not be disclosed.

Though, on the contrary the Department of Justice also sent out a rather ironic statement during the State of the Mobile Net conference. The Department of Justice went on to say that without the ability to monitor individuals through cell phone monitoring without an appropriate warrant the government would be severely handicapped, and so it is in fact a necessity. In the past the Department of Justice has had a reputation of being a strong supporter of the notion to use mobile tracking and cell phone monitoring strategies to aid investigations which any of the law enforcement agencies may be conducting.

Luckily not everything that the Department of Justice stated had been taken for granted, in fact a representative of the Center for Democracy and Technology refuted this point. The delegate fought back with a valid point, mentioning that there was not a single Justice in the country that supported the Department of Justice’s argument and point of view, more so, the Department hadn’t received even one vote in favor of their theory.

As far as the point of view of the cell phone carriers in the nation is concerned, they don’t seem to be bothered with it too much; if anything they too support the idea. The reason for this is not so complex, the data that the police of investigative agencies require from them is readily available with the service providers, and as it greatly assists in their searches, the companies capitalize on their dependency and make a good deal of money from this trade of information. There is already much talk regarding the manuals and extra bits of information that cell phone carriers issue to legal authorities, and making a warrant compulsory would only reduce the amount of revenue that companies are making from selling this information.

Author Bio: Stella Rebecca has been in the business of providing quality information on tracking app for Iphone. Her main expertise lies within the spectrum of Moniotring software for Android and Spy app for cell phone which are making waves in the technology world today..

Spy Phone Gold : How To Monitor a Cellphone Record Calls Msgs Information

Most of the peoples want to know what their kids are doing on CellPhone. So in this article i will mention you some of the features of Spy Phone Gold. So in which you can secretly record their messages, calls, history, GPRS location and many more. I have mentioned many other spy softwares but this one is the best for capturing all the happening on your phone. It's a very powerful & complete program which works Invisibly on Mobile Device.



How Spy Phone Gold Works?

The Installation of Spy Phone Gold is very simple, no need for extra knowledge. Simple Follow Below Instructions.

Step1. After you purchase this software, you can directly download this program on your mobile device, and it takes approx ( 15minutes ).

Step2.
After the installation, this would secretly and invisibly records all the happening of your mobile, including Call, Messages, GPR location and many other private information.

Step3. To See the Logs of your mobile device, login to your web account and you would know what's going on in your device.

Compatibility:
BlackBerry 
Android 
Apple 
Windows Mobile 
Symbian phones

Some Features of Spy Phone Gold

1) Records Call.
2) Captures Screenshot of Mobile.
3) Records Messages.
4) GPRS Location
5) Powerful & Stealth Monitor
6) Works Invisibly.
7) Environment listening.
8) Duration of Calls
9) Sim Changing Notifications.
10) Email Logs.

Enjoy Hacking... Get Spy Phone Gold ( Full Version with 1 year warranty at a very low cost
Original Price :- $255  Get it just for :- $40 ( 70% discount )





How To Crack Your Friends Password Using Ravan Tool

As we have discussed various method for breaking strong passwords through rainbow tools and many other software. So today we will learn how to crack any Md5, Sha1, Sha256, Sha512 easily with Ravan tool. Ravan is a javascript computing system which is used to crack hashes into simple text.
To Hack your friends passwords your friend must have Internet connection on. Otherwise it won't work. You don't need to download any software or hack, just follow my instructions below!


How To Use Ravan?



Step1.
Go to Here.
Step2. Enter Your Hash for crack!
Step3. Place the value of Salt, If your's is not salt leave it blank.
Step4. Charset Should be same, these dictionary alpha's are used for cracking passwords.
Step5. Enter your hash name.
Step6. Select position for your salt.
Step7. Hit Submit Hash.


Step8. A screen would display to your friends when you will send the url.


Thats It, when they will start it, it would constantly monitor the progress and would give the text.

ENJOY HACKING......

Top 10 Ways How Hackers Hack Facebook Accounts In 2012

Facebook is one of the best and popular social networking website, with more than 800 millions users, so this is why, Facebook has become the number one target of hackers. I have written and discussed various and different methods at MHT for hacking Facebook accounts. As my previous methods are not working due to the dramatic change in 2012. Hackers are struggling and working very hard on hacking and cracking. So that's why i am making this post for newbies and for those who wants to take revenge towards their enemies and victims. Lot of things have went updated or have been patched by professional hackers. So today i will show you the top ten methods for Facebook hacking.

Top Ten Ways How Hackers Hack Facebook

1. Facebook Phishing


Phishing is a very popular method for hacking facebook email & passwords. In this attack, hacker creates a phishing page ( fake login ) and will send the URL to his friends and victims. As the victim will enter his email and password, it would send to the hackers email or anywhere in a folder on webhost. Thus, this will hack facebook easily and securely. This method could be detectable by many of the browsers.

2. Keylogging

Keylogging is a very easy method for hacking facebook accounts. From my advice, everyone should try this attack as it is very secure and safe. Keylogging is basically related to stealing private information, it is a small program which works invisibly, once it is installed on victim's computer. It would give all the secret information which includes Keystrokes, Emails, Password, bank details including login's active screen. After capturing all the recording this will creates a log file and would invisibly send it to hackers email through Ftp Server. On MHT I have discussed many method of keylogging, I would recommend this method.

3. Stealers

Nowadays 90% of the hackers use Stealers for hacking accounts. Stealers are the small undetectable programs which captures all the saved passwords from the browser of victims. As majority of peoples used to save their passwords in their browser like Mozilla, Chrome. This thing could be very dangerous due to IStealers.

4. Session Hijacking

This Attack could be often very risky if your network is not secured, or if you are using http:// connection. In my previous article i have mentioned how hackers hack through hijacking session. In this method the hack steals the cookies of victim's recent login, which could be very useful for hacking account. So if you want to hack through cookies session hijacking, read my post below.

5. Sidejacking With Firesheep

This Method is kinda old but some of the hackers mostly use this when their victims or neighbours are on the same network ( Wifi or Shared network ). Firesheep helps hacker from gaining private info and logins through sharing. I will soon make an article upon Firesheep. This method was banned from government due to sharing of network.

6. Mobile Phone Hacking

Business in life is the major problem of every users. So this is why 60% of the facebook Users are running their accounts on their mobile phones, So that this would safe their time. But hackers are hackers, they have build various things from which they can get the user's password whether he is on Mobile or Computer. Now hackers can monitor or spy mobile phones through network or GPRS locator.

7. DNS Spoofing

This is a common method mostly used in offices and vacancies for stealing private information like login's and personal data. But this could be used for Facebook Hacking. As the victim using Facebook.com on the same network of the hacker. A hacker could change facebook.com into his phishing page. I would update an article in upcoming days.

8. USB Hacking

The Most Common attack mostly used by relatives and Friends. If your relative has stored Keyloggers and Stealers in his usb, this can be very dangerous as when the victim would connect via Usb Port all the spywares and Viruses will start work on his computer which would be very risky as it would give all the info to the hacker. From My advice a Powerful Firewall and Antivirus Shield show be active.

9. Facebook Reverting

The Best and the newest attack mostly used by professional hackers, as they are very genius they can steal accounts through Password recovery and guessing friends, a very clever attack which can change the password of targeted victims to hackers desired password. For more details read below post.

10. Facebook Hacking Course

This is a classified facebook hacking course by an ethical hacker Rafay Baloch ( a genius hacker from pakistan ). In this Course you will learn the real hack of facebook hacking. Including above attacks and more professional ways. to get this course Goto :- Here

So friends, I have mentioned you all the methods and attack of Facebook Hacking in 2012.
Enjoy Cool Hacking...

Istealer 6.3 Tutorial : Learn How To Hack Email Account Password

Hello Friends, We have discussed Various Methods for Hacking Facebook & Twitter Account. Today i am back once again with a blasting tutorial on password stealing. I would be using Istealer. Istealer is basically a form of malware which when installed on someones computer, records and captures the save information like Email, Password, username stored usually in browsers. It then sends the logs to hacker's server. So today i will show you some quick ways in which you can steal your friends and victims password. It would be great in the absence of antivirus or when it is disabled.


Hack Password Through Istealer

STEP1. Create a Free account on http://www.byethost.com/

STEP2. Download Istealer From Here & Files From Here. Now Open 'Index.php' in the php logger with notepad and change the values to the below ones.

You can see below settings.


STEP3. Now Login to your webhosting account, hope you already have chosen the MYSQL password, Username and Password can be anything. Now goto your upload section and upload the files via ftp you can also upload the files via FILEZILLA CLIENT.


STEP4. Now Launch your Powerful Istealer and select the index.php path of your server.


STEP5. It has several option like you can bind it with something else like movie, games, and other stuffs. You can easily change the icon with your own desire icon. This will work in all the browsers and would work   invisibly.

STEP6. Now, When you will send the stealer file to your friends it would capture all the stored passwords and would send it to your server.
Hence You can see the outputs at :- www.yourhosting.com/index.php
Enjoy HacKing......

Utorrent Hack - Boost Your Torrent Speed Upto 10Gb | Get Unlimited Downloading & Uploading Speed

After a long time, I am posting a new article on uTorrent speed hack. In our Country Pakistan, we have a decent 1 Mb download speed but upload speed is half then that of downloading. There is a perfect bug to increase/boost downloading-uploading speed of uTorrent. A professional way mostly used by trackers and hackers. So today, I will show you some of the quick and legal steps! this method is known as ratio speed hack do it with your own risk.



Programs That You Need!

1) HTTP Analyzer Software – Here
2) Download Mozilla Firefox – Here
3) Get the Latest Agent Switcher (Extension) For Mozilla. – Here
4) And uTorrent client –  Here

How To Increase/Boost Torrent Speed?

1) Install the User Agent Switcher Extension to Mozilla Firefox,this will connect to the client for tracking.
2) After the installation of the extensions go in Firefox to:
Tools -> User Agent Switcher -> Options -> Options -> User Agents
3) Add the following code in the description “BitTorrent/3.4.2†and press ok.



4) Now Install the HTTP Analyzer!
5) Get a .torrent file from a tracker that would be used for the torrent bits source code and add it to your client torrent. (DON'T START IT)
6. Run HTTP Analyzer and go to the “Start Logging” menu, select “Select a process“, select utorrent.exe if you’re using UTorrent.



7) Go into your client and launch the torrent .exe file.
8. Now move to  HTTP Analyzer, there get a request to trackers for increasing speed.


9) Replace these of the followings with:
TRACKER.ADDRESS with your torrent tracker address for example (ex: www.filelist.org:81)
INFOHASH with info_hash & your torrent's variable should be taken from the GET request from HTTP Analyzer, REMEMBER REPLACE "PEERID" with the peer_id
PORT with the small letters (port )
UPLOADED must be with a number that you want in bytes for boosting your torrent speed (ex: 10737418240 for 10GB).
10) After this, your torrent would be totally hacked, your downloading and uploading speed would increase upto 10GB.

Enjoy HacKinG...

How To Find MD5 Hashes Decrypts ? Cracking Password Hashes With Rainbow Tables

What's MD5 Hash?

It Belongs to Security applications and it is commonly used for data integrity like SSL and digital signatures. It is typically expressed by 32digits or more. It is protector which used to hide files and personal data.
Recently, I have made many articles upon hacking Hotmail, Gmail Passwords, and many others. So, Today I will Continue My Next Post on How to Crack any Password Hash. I will use Rainbow Tables, as we all heard many other decrypts & encrypts for cracking hashes of facebook passwords and other social networks. Rainbow Tables would be the best for cracking hashes and passwords, as it is free and non-stop.






Tools You Should Have!

1) Rainbow Table Generator which comes in cain and abel.
2) Download Cain & Abel From here.
3) Off-course you should have an MD Hash Too.

How Can You Crack Hashes Through Rainbow Tables ?

If You will Crack a Targeted website Through SQL Injection, you can just find the hashes for passwords and admin's username. For Example,
Username  :- Admin
Password  :- 'bah67837v3ch338bbasgdjasjd'

Follow The Instructions!

1) Run the Winrtgen Tool - add Table - settings.
2) Explanation for guessing a password. In portion hash, type the targeted website's password hash. In minlen, type the minimum length for the password. Max len should be 6-15, Index should always be '0'.In chainlen type the possible lenght of the entire password, i will use the maximum. Obviously, every password have 1 number of table.


3) Now Press okay button, it will generate the password in numeric form.
You are done! Now wait for 5 minutes or more, this will convert the hash into simple form.

Here Are the Following Results!



Hash:675ghab612bggs1239chsl6372g338gh :-  Password - 123489
Hash:1253gb3h43243h4g3243b4hjg234122j :-  Password - 347161
Hash:487vfty32539t24d7d8195d2a1d1cfdfo :-  Password - 651320

Note :-
These are the high cracked hashes, rainbow tables could be used for brute forces and dictionary attacks. Try this with your own risk. 
Enjoy HacKing...

Hack Twitter's Account Password - Check Whether Your Girlfriend/Boyfriend Cheating You Or Not!

Hello Friends Today is the day of Hacking twitter accounts by phishing method. This method is kinda old but helpful and secured. In my previous post I had teach you how to crack hashes, hack torrent speed and many others. Nowadays twitter is also getting more and more popular, so that's why I am making this article on hacking twitter's account password with Phishing. Try this at your own risk.


How to hack Twitter's Account Password?

1) First off all, make an account on http://www.p4o.net/signup.php 


2) Now in this step you have to confirm your Signup!
3) Download the phisher from here.
4) Now login to your pro.net account and go to Online File Manager.


5) Now click on (htdocs) and hit upload button.


6) Now, choose the file from your path and upload them.


7) That's it, Now when someone will login to your twitter phisher. The email and password of that person would be stored in http://www.yoursitesadress.p4o.net/lol.txt.

SubScribe Us And EnJoy HacKing...

Android Spy : Powerful & Stealth Monitor Calls, Email, Text Messages

Using the Android Powerful and Stealth Spy is a great idea only for those humans who are looking to make use of mostly effective tools. If there's anyone in your personal life and has stuck you in a loop with lies, lame excuses, frauds then you have come to the right place. Once you install the powerful android spy, you would be able to put all suspicions & many other doubts, because the truth would be within your grasps. So, Guys Let me show you some of the important features of Android spy. 




 Some Interesting Features :-

1) Send Email Logs
2) Interception of calls
3) Live Listening / Spy Calls
4) Call Recording
5) Picture Capturing
6) Reverse Mobile Lookup
7) Video logging
8) Browser History Loggings
9) Contact Details
10) Text Messages
11) Tracks GPS Location
12) Sim Change Notification

How It Works?

1) Register Online for free and then download the software, install it on the targeted phone/mobile.
2) This Programs records all the happening on your mobile device.
3) After Installation victim's text messages call records and all other things would be sent to your online account.

Which Phones are Supported?

1) Android
2) Blackberry
3) Iphones
4) Nokia
5) Windows Mobile Phones

Be Square & Be There!

This Android Spy allows you to listen in live to from your target user is saying if you choose to. You can do this through the live spy call option or if you are pressed for the time you can also record the surroundings. If your problem is that, that your target user switches many Sim-sand disappears with contacts, text messages and everything etc – discuss your problem solved with us which will not only let you know by us about any change in conditions of the phone’s Sim card but we will also continue to work confidently of how many different Sims your victim user changes.
DOWNLOAD ANDROID SPY FROM HERE

chitika