Posts

Showing posts from July, 2012

Make Free Phone Calls From PC

Image
Many of my blog readers where asking is there any way to make free phone calls from PC so i decided to share a few cool things like " How to make Free Phone calls from your PC to any Mobile or Landline phone " in the World" . Its absolutely free i.e 100% free. So guys read on.... How to make Free Phone calls from your PC First of all download FriendCaller from here . its a .jnlp file so u need to have latest version of java on your system After it is fully installed, open friend caller from desktop. Then register. I recommend you to use temporary email for the registration, like yopmail.com

Hack Windows Password

Image
Hack Windows Password Using Pwdump I have already written articles on How you can hack windows passwords Using various tools such as Ophcrack ,Chntpw and i have also written  an article on how to hack windows password using stick keys . In this article i will explain an another way to Hack/crack windows password using  Pwdump and John the ripper.

How to hack Windows Password

Image
Ever wanted to login to your friends/schools computer  which is password protected or  you’ve lost your Windows password and you've logged out of your computer. If you are in one of these situations you can use Ophcrack to hack/recover your passwords  .In this tutorial i will Explain how to hack windows password using Ophcrack

Remote Hacking Using Ardamax Keylogger

Image
Basically Keylogger is a software that is installed on a Victims computer without his knowing, this Keylogger software simply keeps on recording the Key strokes typed by the victim and sends them to your mailbox. No doubt, these keystrokes contain the victim’s Email passwords and All such important information.Hence you can hack your friends Email account passwords and various other passwords. To know more about Keyloggers you can read my last article What are Keyloggers. In this article i will explain how you can Install Ardamax keylogger remotely on victims PC

What are KeyLoggers ?

Image
A KeyLogger A keylogger sometimes called a spying software is a small program which is used to monitor a local or a Remote PC, Keyloggers now a days are so easy to use that a person with even a basic knowledge of computers can use keylogger.Once a keylogger is installed in your computer it can monitor each and every keystroke typed on your computer, thus key logger can be used for many purposes such as monitoring your children , employees and many more.

How To Hack Remote ADSL routers

Image
ADSL routers also known as DSL modems is a device used to connect the computer to the DSL phone line for using Internet Services (broad band ).These ADSL routers have a serious vulnerability in them, which most of you are not aware off . In this post I will show you how to exploit this common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings Hack Remote ADSL Routers ( DSL modems ) Every DSL modem (router) comes with a user name and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default user name and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default user names and passwords. Here...

Hack Facebook / Twitter accounts using Fire Sheep

Image
In my Previous tutorial Hack Facebook /twitter accounts by stealing cookies we hacked Facebook book by side jacking i.e stealing cookies and injecting them in our browser . In this tutorial we will do the same by using a tool Fire sheep .This hack works when computers are connected in  a LAN (Local area network ) or when connected in public WiFi . Best place try out this hack is in schools , collages where computers are connected in LAN and in public places such as airports , hotels  where there's public WiFi. What is Fire Sheep ? Fire sheep is an extension developed by Eric Butler for the Firefox web browser. The extension uses a packet sniffer to intercept unencrypte d cookies from certain websites (such as Facebook and Twitter) as the cookies are transmitted over networks, exploiting session hijacking vulnerabilities. It shows the discovered identities on a sidebar displayed in the browser, and allows the user to instantly take on the log-in credentials of the use...

Hack Facebook Account by stealing cookies

Image
Introduction In this tutorial i will explain how you can hack a Facebook/twitter accounts by stealing cookies. This method works only when the victims computer is in a LAN (local area network ).Best place to try out this is in schools ,collages ,cafes . where computers are connected in LAN .Before i proceed let me first explain "cookies". What are Cookies ? And What is the use of stealing cookies ? Cookies are small files that stored on users computer by websites when a user visits them. The stored Cookies are used by the web server to identify and authenticate  the user .For example when a user logins in Facebook a unique string is generated and one copy of it  is saved on the server and other is saved on the users browser as Cookies. Both are matched every time the user does any thing in his account So if we steal the victims cookie and inject them  in our browser we will be able to imitate the victims identity to the web server and thus we will be ab...

Hack a Facebook Account Using a Fake login Page

Image
Phishing  Phishing is one of the easiest methods that you can use to hack Facebook accounts or any other email accounts ,In this article i will explain how you can Hack Facebook accounts by using a Phisher (fake login page ) . What is Phishing? Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.

An Introduction To Virus Coding

Image
Introduction Virus coding is not as tough as you think its easy , Today Viruses are coded in various languages but the best are coded in Assembly and C. If i start writing tutorials on Assembly and C . I am sure most of my blog readers will never ever visit my site . As most of my blog readers are beginners so to make it easy for them .In this article  i will teach you how to code Batch File viruses which are the easiest to write and understand And for the intermediates who already know this stuff i will be adding links at the end of the post from where you can learn High level Virus Coding I believe all my bog readers know batch file programming .If not i would suggest you to google on this subject . So in this article  we will see a very common and famous batch file virus " Fork Bomb "

What is a Computer Virus ?

Image
In my Previous article I explained about malware .In todays post i will be explaining about Computer Virus which is a type of malware A computer virus is a program which reproduces itself. It may attach to other programs, it may create copies of itself (as in companion viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. There are thousands of viruses, and new ones are discovered every day. It is difficult to come up with a generic explanation of how viruses work, since they all have variations in the way they infect or the way they spread. So instead, we'll take some broad categories that are commonly used to describe various types of virus.

An Introduction To Malware

Image
Introduction Malware is a generic term for bad software. Malware is an abbreviation for ‘malicious software’ computer program .Malware consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior .