Monday, May 30, 2011

Dragon Browser For Hackers

1 comments

Hey everyone, this is Harsh Daftary presenting new browser made
for hacker’s.. Browser purely made in vb, small yet fast browser.
This includes hacking and programming zone’s and some hacking tools..

Features:

Windows Mail
Online Media Player
Hacking News Zone (The Hacker News)
Programming Zone
Hacking Zone
Exploit Zone
Google dork list
port scanner



File Information:


File name: dragonbrowser-setup-exe
File size: 858kb

Download link:
**************

Check Wether your Pc is Male Or Female

1 comments
Today I am going to discuss about an amazing trick using which you can easily find out whether your pc is male or female. To find out whether your computer is male or female just follow the steps given below.

Step 1
: First of all open Notepad.

Step 2 : Now type the code given below in notepad:




CreateObject("SAPI.SpVoice").Speak"i love you"

Step 3 : Now save the file as computer_gender.vbs. (you can save the file with any name like anything.vbs)

Step 4
: Double click the file to run it. If you hear a male voice, your computer is a male and if you hear a female voice then your computer is a female. So what are you waiting for? Check now whether your computer is male or female and share your computer’s gender with us.

Acunetix Web Vulnerability Scanner Version 7.0 with crack

0 comments

Download the latest version of acunetix web vulnerability scanner..

patched version free download:

Windows Mystery Exposed : Can you make a folder named ‘CON’ ?

0 comments
Nobody can create a FOLDER anywhere on the computer which can be named as “CON”. This is something pretty cool…and unbelievable… At Microsoft the whole Team, including Bill Gates, couldn’t answer why this happened! TRY IT NOW !!
This is not the first time I listen about this funny question that "why we can't create a folder with name 'CON' " ?, and I’m sure most of ICA member also try to make folder "CON" just now after reading the title of article ! if no,then go and 1st try it .... If you try creating a folder named CON, as the mail claims, it’ll get renamed automatically to New Folder. But there is no mystery behind this, and the team at Microsoft very well knows the reason for this. :-)

Why is it not possible to create a folder named CON ?
Before we proceed further, let me tell you a small secret you can’t even create a folder named PRN, AUX, NUL and many others.



The reason you can’t create a folder with these names is because these are reserved keywords used by DOS. The below screen-shot taken from Microsoft’s website shows a list of reserved keywords in DOS.
If you try creating a folder with any of these names, the name automatically changes back to the default “New Folder”. And this is what has caused the confusion. Instead of automatically renaming the folder, had an explanatory warning message popped up.

You can actually create a folder named CON !!
There is actually a way to create a folder named CON, or any other name from the above list of reserved keywords. This can be done through command prompt. But it is advisable not to do so, as it might result in your system becoming unstable.

Step 1: To create a folder named CON, go to command prompt and type “MD \\.\D:\CON” (without quotes). This will create a folder named CON in D:. See the screenshot.



Step 2: You cannot delete this folder by normal delete. To delete the folder, again go to command prompt and type “RD \\.\D:\CON” without quotes.

Step 3: I’ll again recommend you not to try this on your system, as it might become unstable. In case you can’t stop yourself, don’t do it on a drive on which Windows is installed (generally C:).

So people ,On a machine everything is possible...

Why Hackers Make Virus ?

1 comments

With the development of computer technology, developing the technology and sophistication a virus. Even now the spread of the virus can occur more quickly to the world through the internet access more extensive. Now we will try to actually find out why and what cause someone is always working to create a new virus to spread throughout the world each day. At least we got 9 reasons to explain:

1. Used as a research objects
In an online interview. Dark Avenger, a virus maker from Bulgaria said: “I make a computer virus because I just heard of a computer virus and want to know about it, but there are no people around me who can explain “what is it?”. So I decide to create my own virus. I create some codes in it which can damage any data or files. I apologize about it. I started in September 1988. “
2. Does not want to lose with the Antivirus vendor
Some are saying that with the development of antivirus technology, the making of the virus motivated to make the virus more “violent” and more. He does not want to be a loser and give up with the latest antivirus technology.
3. Lack of employment for self-taught programmer
There is so many talented and smart programmers, but still out of luck because the IT company does not need any programmer which have not certified profession. Most of the programme is to obtain knowledge of the self-taught, whereas in almost all IT companies need an academic degree as a condition in which they work. A virus maker says “I make a virus just because do not know anything else that I need to make with my programming ability.”
4. Many Operating System or other software are vulnerable
Too many security holes in the operating system and software – the software can make a certain someone tempted to make a virus by exploiting those vulnerable software as a media for the distribution of the infection.
For example: In Microsoft Office which has a security hole tempted someone to create a ‘Macro virus. A security hole in Internet Explorer tempted someone to create a ‘Worm’ that spread rapidly to the world.
5. Need a famous and attention oriented
Many viruses which displays a text and images in the hope that the creator and his virus will become to famous throughout the world. Initially this virus is not harmful. But in its development, there are many groups appear separately which always competitive and maintain their existences with other virus makers.
Those groups will always keep generating a new virus that more powerful than before, which is not detected and spread quickly.
Groups of antivirus makers that is very popular at this time are:
- CodeBreakers, Genesis (UK)
- Nuke, Viper (United States)
- Trident (Netherlands)
Instead of creating a virus, they also reinforce the existence and create magazine and an online article about virus. They are CodeBreaker with CodeBreaker Magazine and NuKE with NuKE Info Journal.
6. Steal and destroy data
There are so many viruses that are made intentionally damage data to someone. There are viruses that can format the hard drive up to more than 2 times to ensure to destroy the data.
Many viruses are also made to steal any data from someone. Suppose the current popularity is a virus that is made to steal passwords and data by uploading the data to the suspect’s computer. This type of virus is often used to steal data opponent, otherwise business opponent.
7. Revenge and disappointed
There are some of viruses makers will do anything for his revenge as his disappointed from his live. They will make a virus which will show their expression about their live. Usually they uses a text and image displayed appear in the virus.
8. Kiddiez
If we try browsing in Google with the keyword “virus generator”, we will find many programs and software that can create a virus which is instantly, even by people who do not understand programming, though. By this Virus Generator, we can make the virus and its variant easily. For example: vbswg (virus generator) made by [k] Alamar from Argentina. For those who make a virus using this tool, they will called as a kiddiez or children.
9. Annoying
This is the reason that is often answered by many of the virus maker. Usually they make a virus to spend their spare time and make it only because it annoying.

What is Brute Force - Password cracking ?

0 comments

Hello , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat....

Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies. Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence. Brute force is considered to be an infallible, although time-consuming, approach.


Crackers are sometimes used in an organization to test network security, although their more common use is for malicious attacks. Some variations, such as L0phtcrack from L0pht Heavy Industries, start by making assumptions, based on knowledge of common or organization-centered practices and then apply brute force to crack the rest of the data. L0phtcrack uses brute force to crack Windows NT passwords from a workstation. PC Magazine reported that a system administrator who used the program from a Windows 95 terminal with no administrative privileges, was able to uncover 85 percent of office passwords within twenty minutes.

You must have seen in movies how a hacker cracks a password. He take out a small device from his pocket. Connect it to the locker or whatever he wants to crack and then lots of digits and alphabets are shuffled on the device’s screen and in a matter of minutes (and sometimes in seconds), the thing is unlocked. Pretty Impressive but it doesn’t happen that way. Basically a online system (by online system i means a system which requires you to log in to get access) can’t be hacked like that. Even a password stored in a offline file can’t be hacked so easily.

Lets take it as easy as it can get. You want to access a file which is password protected. You create a program that tries every possible combination of alphabets and numbers and then feed it to the file if its the right one. This procedure is repeated till the right combination is accepted by the file. This is what we call as a attack. And this very procedure of trying possible combinations is called Brute Force Attack.

Now executing such a program which is required to provide every possible combination requires a very good computing power. The time that it consumes in breaking a password depends on the length of password and the processor speed. Faster the processor, shorter the time it takes to crack the password. Think it would be easy if you have a dual core or quad core, Think again. On Desktop PCs it can take days to crack a password.

Memory Space Trade Off – It is a situation in which time taken for processing can be reduced at the cost of space and vice versa. To make it very clear, lets see this again with the help of an example. In the previous example, we can process the different combination before hand and then store them in a file. And when you need to break a password, combinations are retrieved from that file and this lessens the load on the processor. The only time consumption in this case is the retrieval of data from that file. This file is what is known as a Rainbow Table. It can break passwords in a few minutes and in even a few seconds depending how strong is the password. It can be obtained from the World Wide Web but beware of its size. Its size is in GBs.

Now even if a hacker has the best of hardware, he can’t hack that easily. Why? Ever entered a password wrong multiple times? It requires you to enter the image to confirm that you are a human and it is not a account and even if that fails (yes there are algorithms that can read the text behind the image), the user is forbidden to enter the password for a fixed amount of time. So, there is no way in hell that a hacker can hack by Brute force or even with the help of rainbow tables. But it surely gets the job done for offline files.

If I write more here in a single post, it would be difficult for many of us to analyze the information. So, more in coming ICA articles.But i am providing some most top used Brute force softwares,you can download them and use for testing purpose...

This pack includes the following fully workable softwares:

1.Attack tool kit
2.CrackWhore 2.0
3.Apache scanner
4.Brutus
5.Brutus 2006
6.CGI scan
7.crackftp
8.E-mail cracker
9.hackers utillity
10.php brutforcer
11.php BB pass extracter
12.php cracker
13.shadow scan
14.web crack 4.0

and a few more

download links:

41 Factors - Linux and Windows : Who Better ?

0 comments

Microsoft Windows is a family of operating systems by Microsoft. They can run on several types of platforms such as servers, embedded devices and, most typically, on personal computers. Microsoft first introduced an operating environment named Windows in November 1985 as an add-on to MS-DOS in response to the growing trend of graphical user interfaces (GUI) popularized by the Macintosh. Microsoft Windows eventually came to dominate the world's personal computer market.

Linux is a free Open Source Operating System, based on UNIX. It is available from many vendors with optional paid for support and provides an increasingly viable alternative to the Win 32 platform. C++ and C# compilers are all available on the Linux platform.
Many a times Windows users talk about what Windows can do but Linux can’t. To be fair, they also need to know what Linux can do but Windows can’t.

Reasons why Linux is better than Windows
· Linux doesn’t have the virus problems : Even Microsoft’s CEO Steve Balmer couldn’t clean Windows Viruses. Still not convinced? Its not that there aren’t any viruses for Linux but Linux is more secure and less virus prone.
· No Spyware: Not just spyware but none of those funny applications that keep doing things in the background.
· Linux doesn’t need defragging: The Linux file systems work very efficiently such that it arranges data in a way that it doesn’t require defragging.
· Linux doesn’t crash without any apparent reasons. In Linux the core operating system (kernel) is separate from the GUl (X-Window) from the applications (OpenOffice.org, etc). So even if the application crashes, the core operating system is not affected. In Windows (Microsoft prefers to call this tight integration) if the Browser crashes, it can take down the entire operating system.
· Linux doesn’t crash if you accidentally pulled out your USB key/pen drive. Try this a 100 times if you don’t believe me. But don’t blame me if your pen drive data gets corrupt.
· Linux doesn’t require frequent re-installation: In Windows if the OS crashes, there is no easy way to recover this. Many IT support staff doesn’t know what to do and all they can do is re-install Windows. Which means that users applications and preferences are lost, and needs to be installed again. I haven’t seen anyone using Linux, requiring re-installing unless there is a hard drive failure. Most things in Linux can be fixed without requiring re-installation.
· Linux doesn’t require frequent rebooting: Linux runs extremely stable, even if an application crashes, there is no need to reboot the whole system, just restart that application or service. Linux also doesn’t require rebooting when a new hardware device is added configured. Linux doesn’t require rebooting when you change any setting or re-configure your Network or when you install a new application.
· No licensing headaches: Yes Linux is free and you don’t know need to bother about the complexion licensing of per user/per PC/per server/etc. Note: Some Linux distributions charge a yearly subscription to get the updates and patches, however this is still simpler than the proprietary world.
· 100 File Systems: Linux can read over a 100 different types of file systems. Windows is limited to its own two file systems. Well most general users may not care about this but its extremely useful is you are working in a mixed environment or you need to extract some data from a hard drive formatted on another computer.
· Source Code: You have access to the source code and the right to modify or fix things if you are a programmer. Many end users think this is not necessary but they will realize how important this is when their application vendor decides to discontinue support on an older version to promote a newer one.
· No Piracy: You can also share the software with your friends and its completely legal to do so. Didn’t your teacher tell you in kindergarten that you should share things with your friends? Linux and Open Source actually encourage that while if you do that in Windows its not only considered illegal but they will call you a pirate!
· Linux costs less, because not only the OS is free but the applications are also free. Plus since Linux doesn’t have a virus problem, you also save on the recurring cost of Anti-Virus software. Note: You may still have to pay for support/training but the overall running cost is low.
· Powerful Shell: Both Linux and Windows has shell environment Windows (know as command prompt). The shell environments in Linux (such as bash) are more powerful and you can write entire programs using the scripting language. This is extremely useful to automate repetitive tasks such as backup.
· Portability: Linux can run from a CD or can be installed on the hard drive. Windows by default doesn’t have any such option. Using live CDs such as Ubuntu/Knoppix, users can try out Linux by booting from the CD, without the need to install the operating system. Linux is extremely portable, it can also run off usb pen drives/portable hardrives/thumb drives and more.
· US government have Window Backdoors: Did you know that in Windows, there is built in back-door entry so US government can see you data as and when they like? Yes the US NSA has the key build into every copy of Windows. In Linux there is no such thing possible as the operating system is open source and can easily be detected and disabled.
· Linux has built in virtualization (XEN/KVM/Virtual Box/etc.) so you can run multiple copies of Linux or Windows simultaneously.
· Complete Driver Packages: The Linux kernel comes shipped with large number of hardware drivers. 3000 Printers, 1000 Digital Cameras and 200 webcams were supported by Ubuntu. On Windows, a lot of hardware doesn’t work until you install the driver, this problem is worse with Vista as Microsoft doesn’t allow drivers to be installed which are not supported/certified by Microsoft. On Linux, a huge percentage of today’s common hardware works perfectly out-of-the-box.
· No registry Keys: Unlike Windows, Linux doesn’t use registry. Most of the configuration is stored in plain text files, which are easy to manage/backup and transfer between systems. Registry is a pain to manage, very complex and your system configuration is stored in a proprietary format which needs special tools to open. The biggest pain with registry is when it gets corrupted, this problem is eliminated in Linux because it doesn’t use registry.
· Linux is the most documented operating systems and most of these documentations are available for free. These documents are well written and explain computing concepts too.
· No more hardware upgrades: Linux runs happily on older hardware and the hardware requirements don’t increase with every new version. If you have really old computers like Pentium I/III, you can still convert them to thin clients using LTSP and still use them. If you compare the hardware requirements between Ubuntu and Windows, you would notice that Ubuntu’s hardware requirements haven’t changed for many versions.
· Completely localized: As there is a strong community and the source code is available, Linux is localized into almost every language in the world. You can further customize it for your needs, you can easily do that.
· Excellent package management: Linux has excellent package management tools which make it easy to install and upgrade applications, Most Linux distributions makes it very easy to upgrade from one version to another.
· Excellent Development platform: If you are a developer, you will like Linux. Linux has all the development tools, libraries and compilers built in. If you are Java developer or a Web developer using PHP/Perl/Rub or doing C,C++ development, you will feel at home.
· No Hidden APIs: Windows many hidden or undocumented APIs which is used for unfair advantage to Microsoft. In Linux all APIs are completely open and documented. For example Microsoft specifies that everyone writing Internet application should use the Winsock API while Microsoft Internet Explorer doesn’t use the Winsock API, it uses an undocumented API allowing Internet Explorer to run faster than other browsers.
· No Execute by default: By default if you download any file, it doesn’t have the execute permission, making your system more secure. The app cannot execute unless you go and change the permissions.
· No write access to applications: By default users cannot install applications unless they change their permission or login as a supervisor. This ensures that any virus or malicious code cannot go and write to your application folder.
· No open ports: By default most Linux distributions have all their incoming ports blocked, thereby making their Operating more secure from network attacks.
· Centralised repository of applications ensures that you are downloading your applications/patches only from a known source only. The repository is digitally signed which ensures that only the right application and code can be downloaded and installed on your computer.
· Faster release cycle: Many Linux distributions have a fixed release cycle of 6 months which makes it easy for them to incorporate all the latest applications, bug fixes, improvement and support for newer hardware. Windows release cycle is not predictable. Takes a few years and is often delayed.
· Multiple Interfaces: While both Linux and Windows have a GUI, Windows has only one default GUI. Linux is all about choice and has a option to use different type of GUIs or Window Managers as they are know as in Linux. Users can choose from something that looks like their favourite Operating System or they can choose something that’s simple and fast. Popular ones are Gnome and KDE.
· Free Applications: Most Linux distributions come bundled with whole lot of applications such as Office Suite, Photo Editing, etc. You not only get the OS for free but you also don’t have to pay for the applications. Yes many of these open source applications such as OpenOffice.org also run on Windows but you need to find, download and install them where as there are available in most Linux distros by default.
· Linux saves bandwidth cost: The volume of Updates that Windows, Antivirus and similar applications do, is much more as compared the updated in Linux. So if you are paying for every MB that you download, its a big consideration.
· No automatic updates: Windows Vista it setup to automatically update your system by default. In Linux it will alert you for an update but you have to choice to click and apply the update. You can setup to automatic update if you like. So you can update when you like and not when your operating system decides to update.
· Chat and Social Networking: Empathy/Kopete popular IM clients on Linux are single clients that can connect to all the protocols – Facbook Chat, Google Talk, Yahoo, MSN, Jabber, ICQ, AOL and more. Twitter/Facebook broadcast from the desktop. With Gwibber client, you can view your social network status right from your desktop or update your status to all your accounts without logging onto each of them separately.
· Superb Graphics: Linux already has a usable 3D Desktop – Compiz. This makes it easy to switch and view multiple desktops simultaneously. It also adds a nice eye candy to Linux. If you still believe Linux is only for geeks, this feature will definitely change your mind. This doesn’t require you to purchase expensive graphic cards, it very comfortably works with on board graphic card.
· No annoying message like Vista keeps telling you that xyz application is trying to access your system. Vista confuses the user, either the user will always click allow or don’t know what to do.
· Easy to dual boot: Linux makes it easy for it to exist with any other operating system. If you install Linux on a system which already has Windows, Linux will not mess your Windows. Windows on the other hand messes up your Linux partition, if it finds one.
· Linux has bundled Databases such as MySQL and PostgreSQL which are extremely powerful and used in production environments. Customer doesn’t need to purchase expensive databases.
· Linux is been used for super computing clusters, most of top super computers in the World use Linux. Windows just can’t scale to that level.
· File system scalability: while NTFS file system can scale up to 16TB, XFS on Linux can scale up to 18 million TB! Yes that bigger than what you would ever need.
· Processor scalability: Linux can scale to unlimited processors. It is already running on a single system with 2048 CPUs. Windows can’t even claim to come anywhere near that number.

How To Identify the Fake E-mail ID ?

0 comments

Hello friends, Daily we got almost 100's of face emails ,Like in spam folder. A php script can mail you from any email address...Even from your own email address..So How To Identify the Fake E-mail ID.Here a small guide i am going to share with my all ICA Visitors. If you like the article,then please do a comment..,At present it is difficult to identify the fake ID. With time more and more people are using the fake IDs which creates a bunch of trouble to thousands of people. So here detection of those fake IDs has become almost a necessity. It is also important because hackers are always looking to use the fake email IDs to get the personal information of victims.

There are several techniques to identify the fake e-mail IDs. The common method you can use is to send test mail to those IDs. If you got failure notification then its a fake email IDs. Alternatively there is couple of web service which identify the fake e-mail IDs for the users.

Email Address Checker:
Email Address Checker is well known email IDs checker which identify the the validity of any kind of emails IDs. All you need to do is type the email IDs in the box and press ‘Check’ button. Within a moment it displays the validity of email IDs.

Visit : Click Here


IsValidEmail:

You can also try IsValidEmail as alternative web service to check for valid email IDs. If you got the answer is true then it is valid otherwise it is fake. All you need to add email IDs and click on ‘Invoke’.
is email id valid Easy Step To Identify the Fake E mail ID.

Visit : Click Here


How to Hack using Phishing & 34 phishing scripts

0 comments
Hello friends..
Next very interesting article is about "PHISHING" .This is the one of the easiest method to hack anyone,without knowing the basics of Hacking and Programming...
Remove Formatting from selection

What Phishing is ?
Suppose you check your email one day and find a message from your bank. You've gotten e-mail from them before, but this one seems suspicious, especially since it threatens to close your account if you don't reply immediately. What do you do? This message and others like it are examples of phishing, a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering.

Most people associate phishing with e-mail messages that spoof, or mimic,bank or Credit card companies or other business like Amazon or Ebay. These messages look authentic and attempt to get victims to reveal their personal information. But e-mail messages are only one small piece of a phishing scam.

What to Plan Before Phishing ?

  1. Planning. Phishers decide which business to target and determine how to get e-mail addresses for the customers of that business. They often use the same mass-mailing and address collection techniques as spammers.
  2. Setup. Once they know which business to spoof and who their victims are, phishers create methods for delivering the message and collecting the data. Most often, this involves e-mail addresses and a Web page.
  3. Attack. This is the step people are most familiar with -- the phisher sends a phony message that appears to be from a reputable source.
  4. Collection. Phishers record the information victims enter into Web pages or popup windows.
  5. Identity Theft and Fraud. The phishers use the information they've gathered to make illegal purchases or otherwise commit fraud. As many as a fourth of the victims never fully recover If the phisher wants to coordinate another attack, he evaluates the successes and failures of the completed scam and begins the cycle again.
Phishing scams take advantages of software and security weaknesses on both the client and server sides. But even the most high-tech phishing scams work like old-fashioned con jobs, in which a hustler convinces his mark that he is reliable and trustworthy. Next, we'll look at the steps phishers take to convince victims that their messages are legitimate.
Phishing Scams

Since most people won't reveal their bank account, credit card number or password to just anyone, phishers have to take extra steps to trick their victims into giving up this information. This kind of deceptive attempt to get information is called social engineering. Phishers often use real company logos and copy legitimate e-mail messages, replacing the links with ones that direct the victim to a fraudulent page. They use spoofed, or fake, e-mail addresses in the "From:" and "Reply-to" fields of the message, and they obfuscate links to make them look legitimate. But recreating the appearance of an official message is just part of the process.

Phishing Prevention

Tip 1 : It is important that you learn to recognize all types of phishing emails. You should make yourself aware that if you receive a message which needs you to take immediate action with regard to any of your personal accounts then avoid it like the plague. Most phishing emails will be addressed to either “Dear Valued Customer” or “Dear Sir/Madam”, while any legitimate emails from your bank or credit card company will be addressed to you by name. It is important to know that the phisher who has sent the email in the first place is after your personal information in order to use it for fraudulent purposes.

Tip 2 : Never ever send any kind of sensitive personal information using an email. Emails are not the most secure form of communication available for people to use on the Internet. Certainly many scammers are quite capable of producing an email that looks legitimate and so will be easily able to forge such a document and then gain your information in this way.

Tip 3 : If you do have to transmit any personal information over the Internet then ensure that the site you are providing it to is completely secure. The best way for a person to identify if a site is secure or not is by looking at the site address. All sites which are considered to be secure should start with “https://” and not “http://”. Also if you look in the browser status bar you will see the lock icon being displayed.

Tip 4 :If you ever receive an email from someone you do not know and it contains a link within it then do not click on it. Rather what you should be doing is opening up an new browser page and then typing in the address which you know to be the authentic one. Or else you could call the person or company directly if you have had dealings with them and have spoken with them by telephone before.

How to do phishing ?

ICA members,Now i am going to explain that how to do PHISHING...Steps are indicated as follows :-
Step 1 - Firstly you must signup for a free web hosting service like:
www.freehostia.com
www.byethost.com etc….. and register a domain or subdomain.
After getting your signup done, you have your own subdomain like for instance you registered with freehostia, then your domain is like “www.yourname.freehostia.com”

Step 2- Now Login to your freehostia account and go to “File Manager” in the freehostia control panel.

Step 3- Now what you have to do is, go to your domain folder like “yourname.freehostia.com” and create a separate folder in that directory with the name of the site, for eg. yahoo , if you want to phish a yahoomail account!

Step 4- Download The scripts From below links the compressed file and extract it to your desktop:
and then open your desired phishing file. You’ll find 3 files there viz. “Index.html” & “login.php” & "passwords.txt" [ name may vary but similar in some samples ]. Here the Index.html file is Page looks similar to Phishing sites like.. facebook,gmail. and Login.php file is used to process the data and password.txt is to save all hacked password.

AOL.com - AIM
d2jsp
DailyMotion.com
eBay.com
EverQuest Forum
FaceBook.com
FileFront.com
Gmail.com
Gmail.de
Habbo.de
Habbohotel.com
ICQ.com
Itunes
Megaupload.com
MMOCheats
Myspace
Nexon.net
OGame.de
Oxedion
Packstation
PayPal.com
PhotoBucket.com
Plesk
RapidShare.com
RapidShare.de
Rip/wa/y.com
siteworld.de
Skype.com
Steam phishing Site
Strato
Usenext
VanGuard
Yahoo.com
YouTube.com


DOWNLOAD ALL

Step 5- Now upload all 3 files to www folder inside “yourname.freehostia.com” .
So when you’re done with the uploading part, the link to your yahoo phisher is “www.yourname.freehostia.com/index.htm”.

Step 6- Congrats !! That is your phisher page !! Now all you have to do is copy the link to the phisher file i.e.”www.yourname.freehostia.com/index.htm” and send it to the victim you want to hack ! When he/she’ll open that link, it’ll be directed to your yahoo phisher and when he/she logins that page he/she’ll be redirected to the original website and you’ll get the password in the “password.txt” file which will be created in the same folder you created in your freehostia domain and the path to that file will be “www.yourname.freehostia.com/password.txt” !


How to make Victim to Login on your Phishing Page ?


There is a simple ,but effective Method to make the victim fool,So that he/she will Login on your Phishing page without using there mind.... :-)
I am going to show a example of HI5.COM

1.) Go to your inbox and find a simple hi5 Friend Request.Copy it like in the picture:



2) Go to http://www.sendanonymousemail.net/ or http://www.anonymailer.net/ and send the email to Victim Like shown below...



3.)Now select the "Accept Friend" line.
*Click the hyperlink button.
*Paste your phishing link there.
*Click OK button.
See the pic for more:


4.) Now fill in the fields like this :

To: victimemail@dumb.com
From: info@hi5.com
Subject: Someone has sent you a hi5 Friend Request
Then enter the security code and click send.The e-mail will look like it came from hi5 just that it will redirect the victim to your phishing link instead of hi5.com
The same can be done for facebook and many more websites of your choice.
NOTE:There is a chance that the email wont be sent sometimes.So the best it would be to send it on your own inbox just before you send it to your victim.


IMPORTANT NOTE: CHANGE YOUR FREEHOSTIA DIRECTORY PERMISSION TO “755” SO THAT NO ONE CAN ACCESS YOUR PERSONAL FILES EXCEPT THE PHISHER LOGIN PAGE!!


How to Hack Softwares to use them Forever ?

0 comments

Hi, I am back today with a most usefull article..Hope all of you will Like It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??

Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.Because Purpose if ICA is 1st to clear your basics.So,When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.




Intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate .
3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.

For example, if the trial period expires on oct 1 2009, always inject the date as sep 30 2009 in the RunAsDate.
Download RunAsDate v1.10

Find Serial Key / Cracks for Any Software !

0 comments


This time i am going to explain you that how you can "Find Serial Key / Cracks for Any Software !".I assume that most of you use pirated software. Not everyone can afford buying a program like Photoshop, which costs $699. In this case you can use alternative, free software or you can download a pirated, cracked version of the program. There is a vast number of websites out there, where you can find serial numbers and cracks for any program, but most of them aren't safe to use. Actually most of them are spam sites that “bombard” you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Botnet army. In this post I will show you the most efficient way of downloading cracks and serial numbers without any risk to your pc. This is the part of Hacking/Cracking using "Google hacking".

Google Hacking : I will explain google hacking in details in next article very soon.But for now its enough to know that,Google hacking means..how you can search all desired information in direct way,using some google searching tricks.

Now in this article i am going to explain all possible ways to Find the serial Key
a.) Using Google b.) Using Craagle Software c.) Using serials search websites.

Finding Serial Key using Google :

To Get the serial number from googleyou have to just follow these steps :






* Go to Google.

* In the search field type : "Software name" 94FBR

* Where, "Software Name" is the name of the item you want to find the serial number for.

* And in google search Results you will get the list of all those websites where the serial key of the required software is available.Thats it !! :-)

HOW DOES THIS WORK ?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for.
2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches :
Search the following Keywords on Google :-

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

Saturday, May 28, 2011

Chapter- 5 ( cyber law )

0 comments

Information Technology Act – 2000
Chapter-V
************************************************************************************
SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES

14. Secure electronic record.
Where any security procedure has been applied to an electronic record at a specific point of time. then such record shall be deemed to be a secure electronic record from such point of time to the time of verification.
15. Secure digital signature.
If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was :-
(a) unique to the subscriber affixing it;
(b) capable of identifying such subscriber;
(c) created in a manner or using a means under the exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered the digital signature would be invalidated, then such digital signature shall be deemed to be a secure digital signature.
16. Security procedure.
The Central Government shall for the purposes of this Act prescribe the security procedure having regard to commercial circumstances prevailing at the time when the procedure was used, including
(a) the nature of the transaction;
(b) the level of sophistication of the parties with reference to their technological capacity;
(c) the volume of similar transactions engaged in by other parties;
(d) the availability of alternatives offered to but rejected by any party;
(e) the cost of alternative procedures; and
(f) the procedures in general use for similar types of transactions or communications.

Chapter- 4 ( cyber law )

0 comments

Information Technology Act – 2000
Chapter-IV
**************************************************************************************
ATTRIBUTION, ACKNOWLEDGMENT AND DESPATCH OF ELECTRONIC RECORDS
11.Attribution of electronic records.

An electronic record shall be attributed to the originator :
(a) if it was sent by the originator himself;
(b) by a person who had the authority to act on behalf of the originator in respect of that electronic record, or
(c) by an information system programmed by or on behalf of the originator to operate automatically.
12. Acknowledgment of receipt.
(1) Where the originator has not agreed with the addressee that the acknowledgment of receipt of electronic record be given in a particular form or by a particular method, an acknowledgment may be given by :
(a) any communication by the addressee, automated or otherwise, or
(b) any conduct of the addressee, sufficient to indicate to the originator that the electronic record has been received.
(2) Where the originator has stipulated that the electronic record shall be binding only on receipt of an acknowledgment of such electronic record by him, then unless acknowledgment has been so received, the electronic record shall be deemed to have been never sent by the originator.
(3) Where the originator has not stipulated that the electronic record shall be binding only on receipt of such acknowledgment, and the acknowledgment has not been received by the originator within the time specified or agreed or, if no time has been specified or agreed to within a reasonable time, then the originator may give notice to the addressee stating that no acknowledgment has been received by him and specifying a reasonable time by which the acknowledgment must be received by him and if no acknowledgment is received within the aforesaid time limit he may after giving notice to the addressee, treat the electronic record as though it has never been sent.
13. Time and place of despatch and receipt of electronic record.
(1) Save as otherwise agreed to between the originator and the addressee, the dispatch of an electronic record occurs when it enters a computer resource outside the control of the originator.
(2) Save as otherwise agreed between the originator and the addressee, the time of receipt of an electronic record shall be determined as follows, namely :
(A) If the addressee has designated a computer resource for the purpose of receiving electronic records
(i) Receipt occurs at the time when the electronic, record enters the designated computer resource; or
(ii) If the electronic record is sent to a computer resource of the addressee that is not the designated computer resource, receipt occurs at the time when the electronic record is retrieved by the addressee.
(B) If the addressee has not designated a computer resource along with specified timings, if any, receipt occurs when the electronic record enters the computer resource of the addressee.
(3) Save as otherwise agreed to between the originator and the addressee, an electronic record is deemed to be dispatched at the place where the originator has his place of business, and is deemed to be received at the place where the addressee has his place of business.
(4) The provisions of sub-section (2) shall apply notwithstanding that the place where the computer resource is located may be different from the place where the electronic record is deemed to have been received under sub-section (3).
(5) For the purposes of this section, :
· · If the originator or the addressee has more than one place of business, the principal place of business, shall be the place of business.
· · If the originator or the addressee does not have a place of business, his usual place of
residence shall be deemed to be the place of business.
· · "usual place of residence", in relation to a body corporate, means the place where it is registered.

Chapter- 3 ( cyber law )

0 comments

Information Technology Act – 2000
Chapter-III
ELECTRONIC GOVERNANCE
**************************************************************************************
4. Legal recognition of electronic records.
Where any law provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is :
(a) rendered or made available in an electronic form; and
(b) accessible so as to be usable for a subsequent reference.
5. Legal recognition of digital signatures.
Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document shall be signed or bear the signature of any person (hence, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of digital signature affixed in such manner as may be prescribed by the Central Government.
Explanation.For the purposes of this section, "signed", with its grammatical variations and cognate expressions, shall, with reference to a person, mean affixing of his hand written signature or any mark on any document and the expression "signature" shall be construed accordingly.
6. Use of electronic records and digital signatures in Government and its agencies.
(1) Where any law provides for
(a) the filing of any application form or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in a particular manner.
(b) the issue or grant of any license, permit, sanction or approval by whatever name called in a particular manner.
(c) the receipt or payment of money in a particular manner, then, notwithstanding anything contained in any other law for the time being in force, such requirement shall be deemed to have been satisfied if such filing, issue, grant, receipt or payment, as the case may be, is effected by means of such electronic form as may be prescribed by the appropriate Government.
(2) The appropriate Government may, for the purposes of sub-section (1), by rules, prescribe
(a) the manner and format in which such electronic records shall be filed, created or issued;
(b) the manner or method of payment of any fee or charges for filing, creation or issue any electronic record under clause (a).
7. Retention of electronic records.
(1) Where any law provides that documents, records or information shall be retained for any specific period, then, that requirement shall be deemed to have been satisfied if such documents, records or information are retained in the electronic form, if :

(a) The information contained therein remains accessible so as to be usable for a subsequent reference.
(b) The electronic record is retained in the format in which it was originally generated, sent or received or in a format which can be demonstrated to represent accurately the information originally generated, sent or received.
(c) The details which will facilitate the identification of the origin, destination, date and time of dispatch or receipt of such electronic record are available in the electronic record: Provided that this clause does not apply to any information which is automatically generated solely for the purpose of enabling an electronic record to be dispatched or received.
(2) Nothing in this section shall apply to any law that expressly provides for the retention of documents, records or information in the form of electronic records.
8. Publication of rule, regulation, etc., in Electronic Gazette.
Where any law provides that any rule, regulation, order, bye-law, notification or any other matter shall be published in the Official Gazette, then, such requirement shall be deemed to have been satisfied if such rule, regulation, order, bye-law, notification or any other matter is published in the Official Gazette or Electronic Gazette.
Provided that where any rule, regulation, order, bye-law, notification or any other matter is published in the Official Gazette or Electronic Gazette, the date of publication shall be deemed to be the date of the Gazette which was first published in any form.
9. Sections 6,7 and 8 not to confer right to insist document should be accepted in electronic form.
Nothing contained in sections 6, 7 & 8 shall confer a right upon any person to insist that any Ministry or Department of the Central Government or the State Government or any authority or body established by or under any law or controlled or funded by the Central or State Government should accept, issue, create, retain and preserve any document in the form of electronic records or effect any monetary transaction in the electronic form.
10.Power to make rules by Central Government in respect of digital signature.
The Central Government may, for the purposes of this Act, by rules, prescribe :-
(a) the type of digital signature;
(b) the manner and format in which the digital signature shall be affixed;
(c) the manner or procedure which facilitates identification of the person affixing the digital signature;
(d) control processes and procedures to ensure adequate integrity, security and confidentiality of electronic records or payments; and
(e) any other matter which is necessary to give legal effect to digital signatures.

Chapter- 2 ( cyber law )

0 comments

Information Technology Act – 2000
Chapter-II
***************************************************************************************
DIGITAL SIGNATURE
3. Authentication of electronic records.
(1) Subject to the provisions of this section any subscriber may authenticate an electronic record by affixing his digital signature.
(2) The authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record.
Explanation: – For the purposes of this sub-section, "hash function" means an algorithm mapping or translation of one sequence of bits into another, generally smaller, set known as "hash result" such that an electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally infeasible.
(a) to derive or reconstruct the original electronic record from the hash result produced by the algorithm;
(b) that two electronic records can produce the same hash result using the algorithm.
(3) Any person by the use of a public key of the subscriber can verify the electronic record.
(4) The private key and the public key are unique to the subscriber and constitute a functioning key pair.