New Post


Saturday, October 30, 2010
How to Hack Gmail Password or Account

How to Hack Gmail Password or Account

Hello Friends in my previous Article "How to hack an Email Account" I have explained the several ways to hack the email account but I have left the third option i.e How to hack Email account using smart Phishing Techniques. Most of us thinks that phishing is very common technique and anyone can detect it. But doing it in smart Ways means its 100% undetectable and victim has to do it for must. Also why I haven't explained this with earlier post ie How to hack an Email Account because this Hack is specific for specific website means you need specific phisher for each website and also you have to take care about creating your account on web hosting accordingly. So guys If you Want to Learn How to Hack Gmail Account or Password then tighten your belts and get ready for awesome hacking experience..

NOTE: This is for Educational Purpose Only. Isoftdl is not responsible for any damage done by You.

Learn how to Hack Email accounts read below:
How to Hack Email Account

Things That you Need for Hacking Gmail Account Password:
1. Gmail Phisher
2. Free Web hosting  Site
3. Little bit of manual Work :P

Introduction to Phishing
If you know little bit of Hacking then Its must for you know About Phishing i.e What is Phishing and how it works and most important How you can protect yourself from getting into the Trap. I will try to explain all of these in my article. 
First of all What are Phish pages and what is phishing?? Phish pages are basically the fake pages or virtual pages that looks similar to the original website Page. The only difference is the batch program running in the background i.e Original Webpage sends requests to Gmail server while Phish Page sends request to hacker's php server. Now Phishing is a password hacking technique commonly used by hackers using phish pages that looks similar to original web page. The only difference is the URL in the address bar so Guys One Important Tip for you all always check the Address bar while going to any website .
Now What is Smart Phishing, Normal phishing page sends the password to hacker but it doesn't redirects the page to original website but smart phishing does. Means victim can never know what really happened and his account is got hacked. He will only think that he has entered the wrong password as in second attempt the web page is original and he will be able to login and the most fantastic thing is that the original redirected page has username already entered in it that makes it even smarter. 
Now lets come to how it works?? When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it . So when the person clicks on try again it redirects to the actual URL so that the victim does not know that your site is a fake site and gets his password hacked.

Read More in detail about Phising and How to make Phishers:
How to make a Phisher or Fake Pages


1. First of all download the Gmail Phisher.

2. Extract the rar file now you will get three files as given below:
  •       gmail.html
  •       log.txt
  •       mail.php
3. Upload all the Three files to any of the free Web hosting server. Remember while creating the  account on these servers try the username as nearer as possible to the original URL like mail.gmaile or maile.gmall etc.. As its the most crucial step. Some Free Web hosting servers are given below you can also find few more for yourself.
Having trouble in uploading files, learn below step by step how to upload them:

4. Once you have uploaded all the three files to web hosting server now you have to send these to your victim. This is the most important step regarding smart phishing technique.
Most People use same password for orkut and gmail and here is the main hack lies. What you have to do you have to send the HTML email to the victim which looks similar to the Orkut scrap to his email you can easily do this using simple editing to the existing mail. Just you have to change the link with your phish link and content according to the person likings so that he will surely come inside the trap. 
Another technique is that you can send him a request to join a particular community in the format orkut does.
And Last but the most important one Send him mail from Gmail Admin such that "We have seen illegal activity from your account and you need to verify your account and your account is temporarily disabled after this login. To unlock your account Verify your Email and in that link put your Phish link. Now Guys you all will came to know How it works. If you want to Protect yourself its must that you should know what techniques a Hacker can use to hack your Gmail Account.

5. Now After sending phisher to victim, once the user logs in to his Gmail account using your Phisher, his user ID and password are ours..And these are stored in log.txt What you have to do is just refresh your Web hosting account files. 

6. The Log.txt file will contain the passwords and look like this:


Thats all Now you have hacked the password of victim. I hope you all have Liked It. 

If your Gmail account is hacked, see below how to recover your lost Gmail account:
How to Recover your Hacked Gmail or Google Account?

How to Protect Your Gmail Account From Phisher??
1. Always check the URL in the address bar before entering username and password.

2. Never follow any link from your email and any website until u have confirmed the Address bar URL.
If you think email is not from authorized source and want to trace from where it comes see below article:
How to trace Email Address or fake emails
3. Never Follow spam mails and "Win lottery or Cash" mails.

If you think something suspicious is happening in account, find out unusual activities below:
How to detect unusual activity in Gmail account

If you have Any Queries Ask me in form Of Comments... Enjoy and have Happy hacking.

Looking for alternate ways to Hack Gmail account, why not give a try to Fake Gmail Hacker tool, read how to use Gmail Hacker tool to Hack Gmail accounts:
Gmail Hacker | Fake Tool to Hack Gmail Accounts

Friday, October 29, 2010
How to Unblock  Hack  bypass Websense to Access Sites

How to Unblock Hack bypass Websense to Access Sites

Hey Friends Welcome Back , Today I am going to share a tutorial on " How to Unblock or Hack or Bypass Websense to Access sites in Office or College". Note: The techniques are also applicable to bypass or hack any firewall like Cyberoam etc. As we know , Most offices has Websense Firewall to restrict the access to various websites. Sometimes this frustrates users as they are not being able to browse things freely.So Guys Read On..

First of all I would like to provide basic information about Websense. How it works and restricts users to access web freely.Websense blocks the website on basis of two things :
1. Category: Websense divides all the Websites over the internet in some categories like commercial, Business, Entertainment etc. Websense blocks the particular category completely means all websites of that categories are blocked.
2. Based on Meta Keyword : Websense regularly identifies certain keywords and add them to its database of blocked keywords. Now if any of these keyword is included in the Website TITLE or URL then it will be automatically blocked.

1. Cached Copy Hack
Note: This hack doesn't work on Websites blocked by second Websense Technology. But all the websites blocked by first category can be easily accessed.
When you search anything using google In the each search result there are two things in blue color prior to URL i.e Cached and Similar. To view that blocked Website You have to click on Cached as Shown on the snapshot..
How to Unblock  Hack  bypass Websense to Access Sites

Most Websites can be opened using this Technique but some websites require some more efforts. You have to do some more ting like you have to remove certain codes from the Cached URL as shown below...

How to Unblock  Hack  bypass Websense to Access Sites

Hope this will help you to access almost all blocked websites except social networking one's.

2. Finding a Good Proxy
You can also bypass Websense using several proxy sites. Note: Most of the proxy sites will be blocked after one or two days. So you have to search for proxies regularly. But  I have an easy method to find proxies..
you have to use the cached copy hack to find the daily proxy websites...
Method to Find Proxy:
Open the Google and In search Query column type "tech-faq Proxy" without quotes. Now open the Cached copy of the website. Here you will find daily new proxy list now you have to copy the proxy URL's and check for working Proxies.
Now using proxy you can unblock any Website but I will advice don't open Social Networking sites and Emails using these.

3. Using Cloud Computing (Virtual Operating System)
For Opening Gmail ,gtalk,Yahoo,hotmail means all email clients you can use virtual operating system. For this you have to register on cloud computing website. After that you will get Virtual computer online which you can use anywhere in the world just you need a internet connection.
Some Virtual Operating Websites are:

4. Bypass or Unblock Downloading RESTRICTION
In most corporate offices you have download restrictions. I will tell you the basic simple method to bypass all downloading restrictions. Just follow the following instructions.
Open the Internet Explorer then go to Tools then to Internet Options and Then Click on Security Tab. Now Click on internet Icon and then on default level and then click on Local Internet and then again on default level and then on Trusted Sites and Again on default level then click On apply.
Now you will be able to download anything without any restriction. Enjoy happy downloading...

I think you will like the Post. If you have any queries ask in Comments.
Enjoy and have Happy Surfing..
Thursday, October 28, 2010
no image

10 Tips To Improve Security of Your PC for Free

Hello Friends Today I am going to share one of the the Most Important Thing With You Guys i.e How to make your System Almost Unhackable. Today I will Help you to make Your PC stronger and secured against the attacks like hackers,viruses,trojan horses etc... 
A set of Few Easy Steps can make your PC secured and almost Unhackable by 98% of hackers...  I can't Say 100% because Guyz like me and Artificial Hacking Group means My Hacking Group can't be stopped...... But It will surely going to help you to an great Extent..So Guys Read On....

Today almost everyone of us have a PC or laptop (notebook) with an internet connection but how many of us think about it’s security? and How much Secured they are?? In fact most of the people are least bothered about their PC’s security and doesn't even care much to secure it. But believe your 10 mins time can save your PC from almost all types of Hackers and viruses. So I will not take your Much Time and I directly come to the Topic..

Especially if you have an internet connection safeguarding your PC against network threats is a must as you have to secure your personal information and bank details to be secured. If your PC is not secured then it might be vulnerable to various threats and open for hackers.The threat may be as simple as a virus which corrupts your data or as complex as an identity theft where there are chances of huge loss of money.Did you know that unsecured PCs can be hijacked( Hacked) in few  minutes ? If you are really concerned about PC security then here are the top 10 security enhancements for your PC.

10 Tips To Improve Security of Your PC

1. Check Windows Update.Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options. If Its showing Genuine Problem. 
Go to AMAZING TRICKS COLUMN and Check the Post How to Make Windows Genuine Without any patch and software.

2. Install a good Antivirus software and update it regularly.An Antivirus without updates is of no use. Examples of Best Antiviruses are Avira,Avast and AVG. Don't Ever Use Cracked Versions as They themselves contains viruses. Avira's Free Version Is himself provide better Security than Norton's Full Internet Security. In combination Use Some Trojan remover Like Trojan remover .
Its a best Combination. If You Not Regularly Installs an application on you PC then I recommend
DEEP FREEZE. Its just Best...

3. Install a personal firewall. Both SyGate ( and ZoneAlarm ( offer free versions.

4. Install a good Antispyware.(Antivirus with built-in antispyware is a go0d choice).You can Prefer Trojan Remover and Spyware Terminator . Itz just Best.
You can download them free from:

5. Use strong passwords and change them periodically. Passwords should have at least seven to eight characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro#l. This will make it much harder for anyone to gain access to your accounts and brute forcing for password is almost impossible.

6. If you’re using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.
I recommend to Use Other Clients like Thunderbird or PIDGIN as they are more secured and also their versions are regularly updated.

7. Be skeptical of things on the Internet. Don’t blindly assume that an email “From:” a particular person is actually from that person since it is possible to send a fake email. Never Follow the Links of the Websites from Emails as 1 of every 150 mails is a virus. Don't click links through email ID's especially the mails like You have won a lottery of 100000...$$ .. Itz just a LOL mail asking your confidential Information like name ,age,address and phone number..

8. Check for Versign SSL (Secure Sockets Layer) Certificate (Or logo) before you make any ecommerce transaction (Credit card transaction) with a website. And always use virtual Keyboard to enter the passwords and user names of secured accounts like credit cards etc..

9. Never disable the Auto-Protect feature of your Antivirus.If your Antivirus doesn’t have Auto-Protect feature then manually scan the files before you execute them. Avoid using cracks and Keygens. Try to download serial keys instead of keygens or cracks of softwares.

10. Never give out your passwords to anyone at any time even if the person claims to be from “support.”.Also If you uses Internet from cybercafe . Always keep changing your passwords...

If you Have any queries regarding Topic ask in Comments.. Enjoy and Keep Visiting Website..
Saturday, October 9, 2010
How to Hack Email Account

How to Hack Email Account

Hello Friends, Today I am going to explain all the Possible Ways to Hack an Email Account and in my next tutorial I will explain How to Save your Email Account From Getting Hacked. Most of us believes that email accounts cannot be Hacked but in this world nothing is impossible to hack. Email account hacking is like counting numbers 12345.... Now you ALL will think that I am joking but I am not . You will going to believe when I explain  the various ways to HACK EMAIL ACCOUNT.
I know most of you are various curious about How To Hack An Email Account?? As a normal user mentality we want to hack email accounts of our friends for fun,spying their activities..etc..So I will not waste your much time and come to the TOPIC....So Guys Read On.....

Birthday Special Tutorial


How to Hack Email Account

1. Keylogger (With and Without Physical Access).
2. Using Remote Administration Tool.
3. SPECIAL ONE ( PHISHING but doing it in a Smart Way).

So friends lets start our first Method . From the title you came to know We are concentrating on Hacking the Email Account but this is the universal Method to hack Anything for a Particular user as we will get all the Key Strokes by the user in the form of Written Log. I have already discussed this method previously but only using the WEB BROWSER Keylogger.

There are more other keyloggers like EcodSoft KeyLogger which are still undetectable by any AntiVirus.
Ecodsoft Keylogger is and All in one Invisible Keylogger . Ecodsoft Keylogger is very powerful monitoring software which could record and log all the computer activity. This key logger tool work in stealthy mode and completely invisible to other people. It could not only record key stroke but the software informations such as applications launched, websites visited, and popular Instant Messenger log.

As the best computer monitor and logger software, Ecodsoft Keylogger is very easy to use with its friendly UI, even for the beginners. After install on any PC you want, it could record and save allthe activity. So it could be excellent parent control and surveillance tool and also could work as a employee monitor.Now you could download it for free and try it easily!


b. Remote Keylogger
It is the best way to hack the remote systems on which you dont have the physical Access. First of all you have to understand How it works.
 The Remote Keylogger runs as a hidden/Invisible process that logs all the keystrokes typed on the computer it is running. The Remote Keylogger then delivers the set of Keystroke logs at intervals set by the hacker to a certain specified location such as email account of the Hacker or some FTP address.

There are Various Keyloggers available in the Market but most of them are detectable by antivirus softwares.
You can use any of the Remote Keylogger like Lethal Keylogger or Armadax Keylogger or Golden Eye...Its your choice but all of them are detectable. Now you need to know How to Make them Undetectable.

There are other methods too to make Trojan or keylogger undetectable like use the software SOFTWARE PASSPORT or u can also do it by opening the packed file with hex editor and editing some signature data.
These are some advanced techniques . Don't worry I will Explain All of these techniques but in Latter Hacking Classes. So Enjoy and Have Fun....

Remote Administration Tools means RAT are the software programs that remotely monitors the each and every details of the Work being done on the system. It's working is similar to Remote Keylogger.
As the name of the RAT comes into my Mind and I always remember the one Name "TROKUZAN". The dad of all Remote Administration Tools. There are other various remote administration Tools like SPY RAT,SNIPER SPY,WIN SPY etc.. but most of them are detectable and make them undetectable you have to follow the similar steps as explained above in case of REMOTE KEY LOGGER. 

There is no method to prevent you from the RAT if it enters into your system. So try to avoid downloading files from anonymous sites,downloading waste hacking tools, keygens, cracks etc.

3. SPECIAL ONE (PHISHING with smart Techniques...)
Sorry Guys I cannot Tell you This method on my Website.  As its extremely dangerous technique and its Working ratio is 100%. I will only tell you How to Prevent yourself from It because you will never been able to know that your Account is Got Hacked and when.

1. Never Follow any Link from you email account even its from GOOGLE, ORKUT or ANY WEBSITE.
3. Never Share your personal information with anyone or send it to anyone.
4. Never Open Mails like YOU WON THIS AMOUNT or LOTTERY. Because the are BOT emails.


Designed by Hackingloops.