Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Tuesday, 17 May 2016

Facebook hacking using Android(Phishing)

                                            
  
    Android is a mobile operating system (OS) currently developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets.Android has the largest installed base of all operating systems of any kind. Android has been the best selling OS on tablets since 2013, and on smartphones it is dominant by any metric.

    So with such a huge demand for android,people want to hack facebook account twitter accounts and what not.So in this tutorial you are going to learn how to hack facebook account using the method well know as PHISHING.Yeah what you heard is exactly correct.
     The very good thing is you don't need a web hosting server.In this tutorial i will show you how you can create your very own web server in your android device.So let's start.

                                                         THINGS YOU NEED:
1.Web Server(DOWNLOAD)
2.Facebook Phishing Page(DOWNLOAD)
3.ZIP File Extractor(DOWNLOAD)

                                                          STEPS TO HACK:
STEP 1.After Downloading the above things you need to install the web server.
STEP2.Now install Zip file extractor and then open the facebook phishing page zipped file and extract it to the location "/sdcard0/pws/www/"
STEP3.Now open the web server and click on START SERVEICES.
STEP4.Now give your victim the URL of your facebook phishing page you could you a link shortener.

              That's all after the victim enter's their creditantials in the directory "/sdcard0/pws/www" password will be showed...
                                                     LIKE SHARE SUBSCRIBE
 


 
    

Sunday, 23 August 2015

Windows XP Free Cracked Full Versions With Drivers Included genuine SOftware

                   Windows XP Genuine With Drivers



                                                    Image result for Windows XP


Click here    :TO DOWNLOAD

Monday, 7 April 2014

Hacking Facebook Using Ghost Phisher

                           
Download Link Ghost Phisher:CLICK HERE

Hacking Facebook

Phishing : 

Phishing Using Ghost Phisher.Ghost Phisher Is A Application Which Helps Us To Do Phishing Easily.We Can Do Many More Using Ghost Phisher But It Is Only Avalible For Linux...

Procedure :

1.Open Ghost Phisher.
2.Open 'Fake HTTP Server' Tab

Thursday, 13 February 2014

Spoofing MAC ADDRESS


Spoof To Be Anonymous


All Want To Hack And They Don't Want To Be Caught.What To Do?
Use A Proxy,Install A VPN But You Can Be Caught By Your Mac ADDRESS,So In This Tutorial I Will Show You How To Spoof Your Mac Address


Things Required
1.MAC CHANGER APP
2.Name Of Interface
Let's Start
Now We Will Find The Interface Using ifconfig command
Now We Will Change Using Mac Changer App
Open Terminal
Type macchanger "your interface name" -A
That's It It Will Change Then Restart The Nertworkmanager using This"/etc/init.d/network-manager restart"
Dont Misuse Please...
:) Bye Z3RO B3ST

Monday, 3 February 2014

Generating Passwords To Hack Victims Account


This Tutorial Is All About Generating Passwords To Hack Victims Account

Required Things

1.Backtrack 5 Or CUPP Tool
Just Follow Me:
Let's Start
1.First Open Terminal
2.Type This "cd /pentest/passwords/cupp"
3.Then This "./cupp.py -i"

4.Enter All The Details You Know About Victim.
5.If You Dont Know Any Thing Press Enter
6.Your Password File Will Be Stroed In /pentest/passwords/cupp dictonary.
7.Use This Tutorial As A Guide To Crack password:CLICK HERE



Please Share If You Like It

Tuesday, 8 October 2013

Make A Keylogger And Send It

                                                                                                        Hi Friends Today I Will Show You An Interesting Trick That Is How To Create A Key logger  And Send It To A Friend.All Of Us Want To Hack A Friend Password,Or Find What He Is Doing In His Pc .So Today We Lern How To First Download This File:CLICK HERE TO DOWNLOAD.After You Download Install "setup_akl.exe" 
                Select I Agree.
 Select Next.
                      Select Which Place You Want To Install And Click Next.

Hack Windows 7 Password

hacking windows 7 password
In this tutorial i will teach you to hack Windows 7 password using free open source software called ophcrack. This hack also works on Windows XP and Windows Vista. So let get started.

What Is Ophcrack ?

Opcrack is an open source windows password cracker based on rainbow tables. It comes with Graphical user interface(GUI) and runs on multiple platform such windows, linux and mac.  It allows you to recover or hack windows password.

How To Crack Windows 7 Password Using Ophcrack ?

Before you start doing this you will need a blank CD or DVD to burn the live image of ophcrack.

  1. Download Opcrack Live Cd by Clicking HereDownload windows xp or windows 7 live cd depending on platform you are wishing to hack. For example:
  • Windows 7 or Windows Vista: Click on ophcrack Vista/7 LiveCD.
  • Windows XP: Click on ophcrack XP LiveCD.
  2. Now burn the live image on to the cd.
  3. Insert the disc into drive and restart you computer.
  4. If everything goes right you will see screen like below.
  5. After you see screen like above wait for ophcrack to boot automatically or you may press Enter to advance.
  6. Now you will see several lines of code printed on screen or they might disappear very quickly (you dont need to worry about that).
  7. Then you will see screen like below it is ophcrack password recovering software. At the Ophcrack screen it shows the Administrator and Guest account. Notice the word “empty”. This means that if the account is enabled you could log in without a password.

windows 7 password hacking
  8. Ophcrack WILL NOT CRACK THE PASSWORD because the hash table which it needs is not available for free. But it does show the NTLM hash.
  9. Copy this hash value which is under NT Hash field.
 10. Navigate to http://crackstation.net/ which is an online hash cracking tool.
 11. Type in the hash value you copied down in step 9, Enter the captche and click on Crack Hashes.

Fb Hacking Tool

                   Hii Guys Today I Gonna Show How To Hack Fb Throug App Called "FB HAACKING TOOL"
 To  Download Tool Click Here

Friday, 24 May 2013

Hack A Computer With His IP

How To Hack Computer Via Netbus Trojan



Today, I will tell you how to hack a remote computer Via NetBus Trojan.

> What is NetBus?

NetBus is software (Trojan) which is used to access any computer on the internet
. This Trojan consists of two pasts Server & Client. You have to install Server part named PATCH on the victim's computer. Once you have installed PATCH on victim's PC by physical access or remote access, then you can directly control the destination computer.
Download Free Net Bus v1.7:CLICK HERE
AFTER DOWNLOADING :CLICK HERE
  AFTER DOWNLOADING AND CLICKING CONTINUE TO NEXT STEP
> How to install Server part on victim's computer?
For installing the server part on the computer you have to copy/send the patch on the victim's computer. If the victim will open that file it will automatically install it on the PC.


> How to operate NetBus?

After installing the Server part on the victim's computer, you have to administrator the victim's computer. There are many options which can be used to harass victim.



$. Open/close CD tray..


$. Can download any file from victim's computer..


$. Swamps mouse key..


$. Can screen dump any image..


$. Can play any music/video file from destination PC..


$. Can manage Key Strokes, etc..


> How to connect Server to Client?
After attempting the above procedure, you have to connect both parts of Trojan to gain access on the victim's computer. To perform this action, type the IP Address or Host Name of victim's computer in the followed text box. Don't change the port, let it be as it is. Then you can connect with the remote computer/server.

Tuesday, 14 May 2013

Watch Youtube Videos Without Buffering ANd Facebook Tricks


youtube and facebook hacks

Greasemonkey is Plug-In which is available for Mozilla as well as for for Chrome . This is a very user friendly plug-in which lets you run scripts which enhance your browsing experience and let you play around a little. 

Download : You can download Greasemonkey for mozilla from here .
                   Download for Chrome here.

After installing,the plug-in will appear like this :


Scripts :  

1.Faster buffering of youtube videos and no ads - This is a script which doubles the buffering speed of the youtube videos and also automatically removes the adds which hinder the start of your videos.This script automatically starts buffering the video as you open the video link and there is no need for you to first click on "play" button and then pause it so that the video buffers.
-Install the script from here


2.Export Phone number's of all faceboook contacts to your phone/address book.

-Install the script from here.

3.AutoPoke - Automatically poke back the friends who poke you.
-Install the script from here.

4.Watch Videos with Age Restriction on Youtube : Here's a script which lets you watch videos which have age restriction.

-Install the script from here.


5.Better Facebook : This scripts shows better quality profile pictures,links to download videos,google calender integration and much more ! Moreover,the script is fully customizable !

-Install the script from here



Tuesday, 30 April 2013

Gmail Hacking



gmail logo 550x254
NOTE: This is for Educational Purpose Only. Isoftdl is not responsible for any damage done by You.
Things That you Need for Hacking Gmail Account Password:
1. Gmail Phisher
2. Free Web hosting  Site
3. Little bit of manual Work :P

Introduction to Phishing
If you know little bit of Hacking then Its must for you know About Phishing i.e What is Phishing and how it works and most important How you can protect yourself from getting into the Trap. I will try to explain all of these in my article. 
First of all What are Phish pages and what is phishing?? Phish pages are basically the fake pages or virtual pages that looks similar to the original website Page. The only difference is the batch program running in the background i.e Original Webpage sends requests to Gmail server while Phish Page sends request to hacker's php server. Now Phishing is a password hacking technique commonly used by hackers using phish pages that looks similar to original web page. The only difference is the URL in the address bar so Guys One Important Tip for you all always check the Address bar while going to any website .
Now What is Smart Phishing, Normal phishing page sends the password to hacker but it doesn't redirects the page to original website but smart phishing does. Means victim can never know what really happened and his account is got hacked. He will only think that he has entered the wrong password as in second attempt the web page is original and he will be able to login and the most fantastic thing is that the original redirected page has username already entered in it that makes it even smarter. 
Now lets come to how it works?? When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it . So when the person clicks on try again it redirects to the actual URL so that the victim does not know that your site is a fake site and gets his gmail.com password hacked.
 HACKING GMAIL ACCOUNT STEPWISE:
1. First of all download the Gmail Phisher.
2. Extract the rar file now you will get three files as given below:
  •       gmail.html
  •       log.txt
  •       mail.php
3. Upload all the Three files to any of the free Web hosting server. Remember while creating the  account on these servers try the username as nearer as possible to the original URL like mail.gmaile or maile.gmall etc.. As its the most crucial step. Some Free Web hosting servers are given below you can also find few more for yourself.
4. Once you have uploaded all the three files to web hosting server now you have to send these to your victim. This is the most important step regarding smart phishing technique.
Most People use same password for orkut and gmail and here is the main hack lies. What you have to do you have to send the HTML email to the victim which looks similar to the Orkut scrap to his email you can easily do this using simple editing to the existing mail. Just you have to change the link with your phish link and content according to the person likings so that he will surely come inside the trap. 
Another technique is that you can send him a request to join a particular community in the format orkut does.
And Last but the most important one Send him mail from Gmail Admin such that "We have seen illegal activity from your account and you need to verify your account and your account is temporarily disabled after this login. To unlock your account Verify your Email and in that link put your Phish link. Now Guys you all will came to know How it works. If you want to Protect yourself its must that you should know what techniques a Hacker can use to hack your Gmail Account.
5. Now After sending phisher to victim, once the user logs in to his Gmail account using your Phisher, his user ID and password are ours..And these are stored in log.txt What you have to do is just refresh your Web hosting account files. 
How to hack Gmail Account Password
6. The Log.txt file will contain the passwords and look like this:
How to hack Gmail Account Password 1

Thats all Now you have hacked the password of victim. I hope you all have Liked It. 

How to Protect Your Gmail Account From Phisher??
1. Always check the URL in the address bar before entering username and password.
2. Never follow any link from your email and any website until u have confirmed the Address bar URL.
3. Never Follow spam mails and "Win lottery or Cash" mails.

If you have Any Queries Ask me in form Of Comments... Enjoy and have Happy hacking.


Read more: http://www.hackingloops.com/2010/10/how-to-hack-gmail-password-or-account.html#ixzz2PeXVxf2e

How To Make Window 7 Is Genuine 100 % Working Trick Free 2013

How To Make Window 7 Is Genuine 100 % Working Trick Free 2013

Well in previously I was explained that how to make HOW TO MAKE WINDOW XP SP2 OR SP3 ISGENUINE so now finally after the request of my friend’s and Reader I can try to explain that how can you crack the window 7.
there is a software that is WAT(windows activation Technologies ) from the window 7 which is responsible for the checking the window is genuineness of window so then after removing  the WAT(windows activation Technologies) files then the system will have no need for the genuine keys that make it active cause without the  WAT(windows activation Technologies) it will always Genuine.

How To Make Window 7 Is Genuine free

 REQUIREMENT AND BENEFIT Of Window 7


1) Instead of the 30 days of a trial version you can use the window 7 use for the life long

2)Its works with the all version of the window 7 
Microsoft Windows 7 Home Premium

Microsoft Windows 7 Home Basic

Microsoft Windows 7 Professional

Microsoft Windows 7 Ultimate

Microsoft Windows 7 starter

3) Its compatible with the 32 bit and also for the 64 bit file system .

IMPORTANT NOTE:

After that you will not be able to update the window and if you do so it might do inactive your window and if any update of the window find that your OS is the pirated .

So here are the crack tools

1.      1.  Remove WAT Download CLICK HERE


 make windows genuine 7 free latest


      HOW TO CRACK THE WINDOW


Window 7 cracker are the very easy to use that you can use it without. Having knowledge about the system now what you have to do is just simple Download the WAT (windows activation Technologies) and then

1. Extract
2. Then Open rw.exe
3. Then click on the button "remove WAT"
4. Then finally wait for your computers to the reboot then the computer no longer have to a genuine status.


SO IF YOU LIKE SO COMMENT BELOW
IMPORTANT NOTE: i am not responsible for any Damage and mistake . So try to your own risk

How To Hack Remote Computer Using IP Address Free 2013

 How To Hack Remote Computer Using IP Address Free 2013

Literally hacking is the accessing something or the somebody in internet without their permission or may be interest. So hacking is common then hacker hack the account and website easily. So today I am explaining that how the hacker attacks on your computer window.
   hacker can be accessing your computer with your IP address. So then the hackers can easily access on your personal thing like your important data or something like this .let’s start in the starting of my article I will explain you that the some process is the following that how the hacker attack on your window. So let’s summarize this hacker do.
  1. A computer victim IP address
  2. The IP address is online
  3. Scan the open ports
  4. Finally check the venerable ports
  5. So then access from the ports
  6. Finally brute-force username and password.
     So now let me describe from basic and step wise

A computer victim IP address:

So if hackers want getting the IP Address of your computer what they do just simply chatting with you on Skype, Hotmail  and Gmail and as well chat room.so they just do follow some step like below
      1    .     They just do open the cmd.exe (open from run and then write cmd)
      2    .     Now then they type netstat –n (its mean that the recently some IP address                        connected  with your computer )
      3    .     After that they can chat with you and now after some chatting.
      4    .     Just again type the netstat –n (so there is new IP located )

HOST ALIVE OR NOT:

Like I found the 192.168.15.29 now just after that they can check that the IP address is open or not mean (online it is reply)
Ping 192.168.15.29

Scan the open ports:

So if the IP is online so now check the ports .so now you download the advance port scanner . if you have nmap, zenmap or backtrack so its better.

check ports scanning free with latest radmin software

Check the Venerable ports and access:

No finally hacker the IP and open ports address so then finally with the telnet command they access in window and Make sure that you have enabled in the computer. If you don’t know just go to control panel > program (add or remove) > add window components > click on the telnet. So now open the command and type like that telnet
telnet (IP Address ) (port number)
telnet 192.168.15.29 23

How To Hack Remote Computer Using IP Address Free

now they After that you will asked to input the login information like below

How To Hack Remote Computer Using IP Address Free

And if the hacker guess the password, if they not do so then they can use the brute force tools or
Some other tools like this CLICK HERE

HOW TO SAVE Computer FROM Hacker's 

always open your firewall is on

IMPORTANT NOTE: 
Don't try to miss use of this trick please . because hacking is a crime .
so if you like so then comment below

How To Hack Mobile Phone With Bluetooth Hacking latest Software's 2013

How To Hack Mobile Phone With Bluetooth Hacking latest Software's 2013

Today i am sharing very interesting trick that how to hack Bluetooth hacking software well you all are familiar with a term of hacking and now a days the people who are unaware of hacking losses their important data, credit card numbers and lots of other thing which are valueable.Well today I am sharing an interesting piece of hacking.People are amazed when they see hacker access a mobile phone with the Bluetooth and multimedia phones .But let me tell you its very simple.There are various hacks and lot of software already available on the different website which helps hackers to hack any cell phone and multimedia phones.In this post that I have outlined only Some Bluetooth Hacking Software and because these softwares are very effective to access any phone.

Hack Mobile Phone With Bluetooth Hacking latest Software's
 And now here comes some of the softwares list of Bluetooth hacking software. 

1) Super Bluetooth Hack (awesome software)


This software is used for the reading information’s and controlling from remote cell phone via Bluetooth or infra .The Phone list and SMS can be stored in the HTML type. In addition to it that will display information about the battery, Sim card and network’s if you download the software  (Super Bluetooth Hack)  simply download it and use it.it is quite easy to use or if you want to install directly to your cell phone than follow the procedure below.
Download Super Bluetooth Hack 1.08 to Your Phone
1.Go to m.brothersoft.com on any browers of your phone
2.Enter Quick Download Page which links at the bottom of the page
3.Enter Code: 127249 to begin download
And more detail about the software so Detail about bluetooth hacking

 2) blue scanner


 The Blue Scanner searches out for the Bluetooth enabled a devices and then try to extract as the much information as possible for a each newly discovered device. Download this software so blue scanner download
Super Bluetooth Hack software , blue scanner software Blue Bugger software

 3) Blue Bugger


 This is simply exploits the Blue Bug (and name of the set of Bluetooth security holes) vulnerability of a Bluetooth enabled devices and then By exploiting these vulnerabilities hacker can access on the calls lists, phone-book and more information of that cell phone. Download Blue Bugger download

 4) BTbrowser

 This software BT Browser is the J2ME application which can the browse and explore the very good information about the technical specification of surrounding Bluetooth enabled devices and the hacker can browse device information so then all supported profiles, services records of the each device.
For download BTbrowser Download

5) BTCrawler

 The BT Crawler is the scanner for a window Mobile Based device and it scans for the other devices in a range and then performs service a query then finally it implement BlueSnarfing.
For download BTCrawler Download

Blue Bugger software | BTCrawler software | BTbrowser software
CONCLUSION:
I have outlined these Bluetooth software that mostly use by the hacker to access into  cell phone. So my suggestion for all the Reader kindly switched off your Bluetooth if you don’t need of this it will save your battery and your data as well.
IMPORTANT note:
It’s just for the educational purpose. Try to use it by your risk
Please leave your valuable comment below about the Article.