New Post

Rss

How to activate windows 7 or Windows Vista for free

How to activate windows 7 or Windows Vista for free

Hi Friends, today i will show you how to activate windows 7 or Windows vista for free. Its a 100% working hack and perfectly safe way to easily activate windows for free. I will explain this with the help of windows loader by daz. This loader application will bypass the Microsoft's WAT(windows activation technologies) and activate your winodws 7 or Vista in just few minutes.The application itself injects a SLIC (System Licensed Internal Code) into your system before Windows boots; that is what fools Windows into thinking it's genuine.

activate windows 7 or vista for free, windows activator
Activate Windows 7 or windows vista for free


Requirements:
1. Supported Operating System Installed( Windows 7 or Windows Vista).
2. Loader by Daz.
3. Internet connection to check the activation is happened correctly or not.

Steps to activate Windows 7 or Windows Vista:
1. Download the Windows Loader application.

Password : www.isoftdl.com

2. Extract the zip file and now you will have four files.
3. Start the Loader.exe by double clicking on it.
4. Now Click on Install to install the SLIC and updating the windows key.
5. That's the only procedure, now just go to Microsoft's website to check your activation. Alternatively you can check it by right clicking on My Computer Icon on desktop and see the General information.

Note: You must be running build 7600 or greater for Windows 7 and Windows Server 2008 R2.
Note: I don't recommend using any of the Windows 7 E editions.
Note: Windows 7 N editions will only be supported when OEM SLP serials leak.

Features of Windows Activator Loader:
•Can be run as a standalone application
•Works well with all system languages
•Custom OEM information can be installed
•Argument support for silent installs
•Can be used for pre-activation
•Application integrity checking
•Custom error handling
•Support for hidden partitions and complex setups
•Can work alongside Linux's GRUB or any other boot manager
•Works with TrueCrypt and many other types of hard drive encryption applications
•Add your own certificates and serials externally
•Offers certificate and serial installation only for users with an existing SLIC 2.1
•Automated system profiling (The application matches everything up for you)


Supported operating systems
•Windows 7 Ultimate
•Windows 7 Ultimate E
•Windows 7 Professional
•Windows 7 Professional E
•Windows 7 Home Premium
•Windows 7 Home Premium E
•Windows 7 Home Basic
•Windows 7 Starter
•Windows 7 Starter E
•Windows Vista Ultimate
•Windows Vista Business
•Windows Vista Business N
•Windows Vista Home Premium
•Windows Vista Home Basic
•Windows Vista Home Basic N
•Windows Vista Starter
•Windows Server 2008 R2: Enterprise
•Windows Server 2008 R2: Standard
•Windows Server 2008 R2: Foundation
•Windows Server 2008: Enterprise
•Windows Server 2008: Standard
•Windows Server 2008: Foundation
•Windows Small Business Server 2008

Don't Forget to say thanks if it works for you.... I hope you all will love it...
SQL injection Hack tool for hacking websites and database

SQL injection Hack tool for hacking websites and database

Safe3SI is one of the most powerful and easy usage penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.


how to hack websites using SQL injection, SQL Hack tool


Features

  • Full support for http, https website.
  • Full support for Basic, Digest, NTLM http authentications.
  • Full support for GET, Post, Cookie sql injection.
  • Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, SQLite, Firebird, Sybase and SAP MaxDB database management systems.
  • Full support for four SQL injection techniques: blind, error-based, UNION query and force guess.
  • Powerful AI engine to automatic recognite injection type, database type, sql injection best way.
  • Support to enumerate databases, tables, columns and data.
  • Support to read,list and write any file from the database server underlying file system when the database software is MySQL or Microsoft SQL Server.
  • Support to execute arbitrary commands and retrieve their standard output on the database server underlying operating system when the database software is Oracle or Microsoft SQL Server.
  • Support to ip domain query,web path guess,md5 crack etc.
  • Support for sql injection scan.

Download
 
no image

Top 5 Hack Tools for Hackers to Investigate Computer System

Hello Friends, today i will share with you top 5 hack tools for hackers to Investigate or Foresnic their computer system or PC. Have you ever felt that your system is compromised or shared ? Do you think your system has unusual softwares or packages installed on it that sends your confidential or secret personal data to other Hackers? Always fears to test any hack tool that it contains viruses or malware or not? Wanna investigate your network that which application is sending which data to whom or where?
If any of the question fits you then this post is for you. But if i speak by heart these tools are must for every noraml users and hackers too to investigate their systems from boot to close. Today i am making you a real ethical hacker as today i will teach you how to investigate your system. And how to get rid of noobish antiviruses that do simply nothing on your PC just consumes resources of your system.

List of top 5 hack tools for hackers to Inverstigate or Forensic Computer system or PC:
1. Live View
2. Start up List
3. Open Files View
4. Wireshark
5. Helix 3

Working of above tools stepwise:
1. Live View
Live View is an open source utility that creates a virtual machine of the existing system. Live View creates a virtual disk out of the system that allows you to then safely investigate a copy of the system without interfering with anything installed. So you can easily investigate your system virtually without affecting the original system.
Now restart you PC for further investigations and tools to use.
You can download Live View for free here (Click here to download).

2. Start up List
Now you have a virtual copy of your system and now why you are waiting let's start investigating PC. So download the Start Up List (click here to download startup list).This is a great way to start the investigation of a system and determine what things might have potentially been put on the system to restart each time the system does. It will provide you the list of all programs that system use during the boot time. Great way to find the keyloggers and other remote montitoring tools as they are always added to start up.
Now why i am saying this tool as you can directly do it using MSCONFIG command. Answer is as simple as question, msconfig only displays the list of programs that are attached to start up using registry keys. Normally what happens the viruses attach themself to some of the existing windows service so it will become difficult to identify its instances. Start up list displays all the back ground programs too. 

3. Open Files View
The next step in investigating your computer is to find or determine which other files, other than usual are open. In Linux we can directly do this using the ISOF command in the terminal but there is no similar command in windows. Ahhah now what will you do to investigate this.. Don't worry OpenFilesView is there(click here to download openfileview). Openfilesview is a Windows executable that lists all the files and processes that are active currently – both local and network based – on the system. So you can easily identify which unusual file is opened or which unusual process is running. Now how it helps, all keyloggers or remote administration tools always maintains a temporary file on which they write their logs or other details. Muahhhhhh... Now nothing is hidden from you. You can see each and everything and find out easily that which noob virus or keylogger is running on your system.

4. Wireshark
Mine favorite tool out of 5 tools. Now you have researched your system using above there tools, it time to investigate your network traffic. Several times it happens, when you install some software you doubt that it is sending your personal data or information to someone else. Wireshark is a tool that monitors your network packets and analyse them where its sending data. Now how its helpful for you, Most trojans and keyloggers sends logs using network and upload them to FTP or send them to some email address. Using wireshark you can monitor what they are sending and even the username and password of FTP and email accounts on which it is sending. This is the most promising factor that makes to love wireshark more. So why waiting download the wireshark for free: (Click here to download Wireshark).

5. Helix 3
Now you all will be thinks we have done everything, investigating is done...:D but i am Destructive Mind. So few more things are striking my mind. What more i can investigate in the PC. Any guesses...
Damn.. i forgot i was teaching you..
Now how will you determine what the noob viruses has changed in your system, which files they have edited or attached their signatures to which of the programs and most important what they have edited or added. This you can do with the help of Helix 3. Helix 3, a newly updated version of the live Linux forensics tool, can be used to examine the disk safely to see what has been finally changed. So guys now how classy you think you have become. But sorry to inform you that its the first part of hacker's life and i guranttee 99.99% guys doesn't know these tools. Ahhh... If they know about these tools then they surely doesn't know how to use them and more important if they know that also they probably never used them as they are LAZY enough and leave everything on noob antiviruses.
(Click here to download helix3)  Its a 30 day trial version guys, as licensed version is for one system only and i can't share mine :D. But i can tell you some awesome tricks to use it as much as you want. For downloading evalation version again and again just register with new email ID and remove the previous version using WinXP manager which removes registry keys also.

One more suggestion about these noob antiviruses, they detect only those viruses and trojans that are in their database, if a new virus has come then you have to wait till next database upgrade for getting it detected.

I hope you liked this article...No you must like this article if you are hacker or want to become hacker and this post deserve a thanks. If you really liked it or found it beneficial then please comment. You can also post your lovely comment if you have any doubts. In my further articles i will explain these tools in detail that how to use these tools effectively. And one more thing, its only the investigation, in future articles i will teach you how to fix these and delete virus signatures from files without even an antivirus.
SQL Injection tutorial to Hack websites | Hacking websites

SQL Injection tutorial to Hack websites | Hacking websites

Hello Friends, as you all know in previous hacking classes we have already discussed about SQL Injections method of hacking websites. Some of my website users reported that those articles are little bit difficult to understand for new users who wish to learn hacking. For the sake of new users who wish to learn website hacking and SQL injection, i am writing this article  at such a basic level that the user who didn't even have any prior knowledge of SQL can start SQL Injecting websites. This article is also beneficial for hackers too as it will refresh their concepts that what really we have to do and look into website URL if we want to hack website or its database using SQL injection. So Guys read on very basic SQL injection tutorial...
hacking websites, sql injection attack
SQL injection tutorial to hack websites | Hacking website databse


What is SQL Injection?
Basically SQL Injections or simply called Structured Query Language Injection is a technique that exploits the loop hole in the database layer of the application. This happens when user mistakenly or purposely(hackers) enters the special escape characters into the username password authentication form or in URL of the website. Its basically the coding standard loop hole. Most website owners doesn't have proper knowledge of secure coding standards and that results into the vulnerable websites. For better understanding, suppose you opened a website and went to his Sign in or log in page. Now in username field you have entered something say LOKESH and in the password box you pass some escape characters like ',",1=1, etc... Now if the website owner hasn't handled null character strings or escape characters then user will surely get something else that owner never want their users to view.. This is basically called Blind SQL.

Requirements for SQL Injection:
1. You need a web browser to open URL and viewing source codes.
2. Need a good editor like Notepad ++ to view the source codes in colored format so that you can easily distinguish between the things.
3. And very basic knowledge of some SQL queries like SELECT, INSERT, UPDATE, DELETE etc..

What you should look into website to detect is it vulnerable to SQL injection attack or not?
First of all you can hack those websites using SQL injection hacks that allows some input fields from which can provide input to website like log in page, search page, feedback page etc. Nowadays, HTML pages use POST command to send parameters to another ASP/ASPX page. Therefore, you may not see the parameters in the URL. However, you can check the source code of the HTML, and look for "FORM" tag in the HTML code. You may find something like this in some HTML codes:

 < F O R M action=login. aspx method=post>
< i n p u t type=hidden name=user v a l u e=xyz>
< / F O R M>
Everything between the < f o r m >  and < / f o r m > parameters (remove spaces in words) contains the crucial information and can help us to determine things in more detailed way.


There is alternate method for finding vulnerable website, the websites which have extension ASP, ASPX, JSP, CGI or PHP try to look for the URL's in which parameters are passed. Example is shown below:
http://example.com/login.asp?id=10

Now how to detect that this URL is vulnerable or not:
Start with single quote trick, take sample parameter as hi'or1=1--. Now in the above URL id is the parameter and 10 is its value. So when we pass hi'or1=1-- as parameter the URL will look like this:
http://example.com/login.asp?id=hi' or 1=1--

 You can also do this with hidden field, for that you need to save the webpage and had to made changes to URL and parameters field and modify it accordingly. For example:

< F O R M action=http://example.com/login. asp method=p o s t >
< i n p u t  type=hidden name=abc value="hi' or 1=1--">
< / F O R M >

 
 If your luck is favoring you, you will get the login into the website without any username or password.


But why ' or 1=1-- ?
Take an asp page that will link you to another page with the following URL:

http://example.com/search.asp?category=sports
In this URL 'category' is the variable name and 'sports' is it's value.

Here this request fires following query on the database in background.
SELECT * FROM TABLE-NAME WHERE category='sports'
Where 'TABLE-NAME' is the name of table which is already present in some database.
So, this query returns all the possible entries from table 'search' which comes under the category 'sports'.

Now, assume that we change the URL into something like this:
http://example.com/search.asp?category=sports' or 1=1--

Now, our variable 'category' equals to "sports' or 1=1-- ", which fires SQL query on database something like:
SELECT * FROM search WHERE category='sports' or 1=1--'
 
The query should now select everything from the 'search' table regardless if category is equal to 'sports' or not.
A double dash "--" tell MS SQL server to ignore the rest of the query, which will get rid of the last hanging single quote (').
Sometimes, it may be possible to replace double dash with single hash "#".

However, if it is not an SQL server, or you simply cannot ignore the rest of the query, you also may try

' or 'a'='a
 
It should return the same result.
Depending on the actual SQL query, you may have to try some of these possibilities:

' or 1=1--
" or 1=1--
or 1=1--
' or 'a'='a
" or "a"="a
') or ('a'='a
'or''='

How to protect you own websites from SQL injection?
 
Filter out character like   '    "    -    /    \    ;    NULL, etc. in all strings from:
*
Input from users
*
Parameters from URL
*
Values from cookie
That's all for today, I hope it really helped you to clear your basics about website hacking or website database hacking using SQL injection.
If you have any queries ask me in form of comments...
no image

Hardware Key loggers to Hack Passwords – PS2, USB, WiFi

Hardware Key loggers to Hack Passwords – PS2, USB, WiFiJust like Software Key loggers Hardware key loggers also captures each keystroke the user types but requires you to be present at victims place. There are many advantages of using Hardware key logger over Software keylogger, some of them are: Hardware keyloggers does not need system access for installation, Invulnerable to security scanners, Stores over a billion keystrokes because of the Fact That they Posses Internal memory of upto 2GB. Also they are easy to use and 100% safe to USE. Because there is nothing installed on the hard drive, it is undetectable by all anti-spy and eraser software.

 

Features of hardware Keyloggers:
• Installs in 5 seconds, simply plug it in and Can be installed even if the computer is switched off.
• Can be installed without logging into the computer and Data inside device is encrypted
• Device is invisible to software running on the host PC, so it is Undetectable by virus scanners.
• Works on any operating system – Windows, Macintosh or Linux.
• Superior backup -If the operating system crashes, the data inside the keylogger is still safe
 How Hardware Keylogger Can help you ?

For Hackers:
• Hackers can use this to hack into Face book, Twitter or any email Account of friends and Relatives.
For Employers:
• Monitor employee productivity, chats, websites visited
• Detect unauthorized access attempts, Backup typed text
For Parents and Spouse:

• Observe websites visited By your Child and activities on Web.
• Allows you to monitor Cheating Spouse’s activities on Web.

Key Cobra – Best Hardware Key logger Manufacturer
Key Cobra is one of the Best Company in the industry and Provide Best Hardware Key loggers at reasonable Price. compatible with all three operating systems windows, Linux and Mac OS. All Key Cobra key loggers posses Advanced text menu for viewing recorded data, includes Net Detective, Phrase Search, Key Filtering, Unplug Counter and more.

Key Cobra Provides 3 types of hardware Keyloggers:


PS2 Hardware Keylogger

The most advanced PS/2 hardware keylogger available on the market. This keystroke recorder comes in a standard version – 4MB memory capacity, 2,000,000 keystrokes (over 1,000 pages of text), and a Venom version 2 billion keystrokes (over 1 million pages of text), organized into an advanced flash FAT file system. This hardware keylogger features a text menu with loads of options for analyzing recorded data.


Best USB Keylogger
New Keycobra USB Keyloggers are the world’s smallest & smartest USB keylogger that can store over a billion keystrokes and organizes everything into an advanced flash FAT file system. Switching into Flash Drive mode allows for super fast data retrieval and download. There is no software or drivers rerquired and is completely transparent from computer operation. KeyCobra USB keylogger works on USB keyboards for PC and MAC computer.


New WiFi Key logger

KeyCobra Provides world’s smallest and smartest Wifi hardware keylogger! This wireless wifi keylogger is packed with state-of-the-art electronics: two powerful processors, a full TCP/IP stack, a WLAN transceiver, and 2 Gigabytes of memory. It features remote access over the Internet. This wireless keylogger will connect to a local Wi-Fi Access Point, and send E-mails containing recorded keystroke data. You can also connect to the keylogger at any time over TCP/IP and view the captured log. All this is a device less than 2 inches (5 cm) long and Supports All Types of Keyboards.

I hope you all like the information... credit goes to Kyrion.
Note: There are other companies too that manufacture the hardware keyloggers but Key cobra is best and cheapest.
If you have any queries ask me in form of comments.

Download Unlimited from Hotfile using Premium cookie Hack

Download Unlimited from Hotfile using Premium cookie Hack

Hello Friends, after a huge wait i am again back with an awesome Hotfile premium account cookie generator. Using this premium account cookie generator you can download unlimited from Hotfile without having premium account for free.
Special thanks to Tom-test for making this tool. In this tutorial i will explain how to use tom-test premium account cookie generator to download unlimited from hotfile for free without having premium account. This tool generates the premium account cookies that we can manipulate to download unlimited from hotfile absolutely free and other services like fileserve, filesonic and rapidshare. But today i will explain you about How to download unlimited from Hotfile using Hotfile premium link generator.


hotfile premium account for free
Hotfile Premium account access for free



Things that you will need to download unlimited from hotfile:
1. Mozilla Firefox web browser.
2. Firefox add on Cookie Manager:
(Click here to download Cookie Manager add on) Just drag and drop the xpi file into firefox then it will ask to install. Install it and restart web browser.
3. Tom-test premium cookie generator.

Steps to download unlimited from Hotfile:
1. First of all download the tom-test link is given above. Extract the Zip File to get two things One file having cookies extractor codes and second is MCG(tom-test) executable file.
2. Open the MCG(tom-test) executable file by double clicking it. When you open a message will pop up as shown below:

premium cookie generator
Warning Message of Premium cookie generator


Click ok to proceed to next step. When you click OK button it will ask you to register. Go to the below website and register as shown below : (Click here to visit website to register) . 

register on tomtest
Register on tomtest to get authorization code

Now you will see the Below Window as shown asking for authorization code:

get authorization code
Get authorization code for premium cookie generator

Now click on Get code Button as Highlighted. When you click on get code, a new window will open having the authorization code as shown below:

authorization code
Authorization code

Now copy this authorization code and paste it in software code box and click on sign in as shown below:

click on sign in
Copy authorization code and click sign in

Now when you press ok you will see the window like this:

snapshot of the settings of premium cookie generator
Full view of Premium cookie generator with settings

Do things as shown in above snapshot.

3. Now go to Mozilla firefox web browser and open the hotfile website (www.hotfile.com).
4. As you have already installed cookie manager. It will capture hotfile normal cookies as shown below:

cookie manager
Cookie Manager in Firefox

5. Now Go to Tools in Mozilla Firefox and Click on Cookie Manager to open it and select www. hotfile. com  and click on add cookie as shown below:

select hotfile cookie in cookie manager
Select hotfile cookie in cookie manager

6. Now add cookie as follows: In name field enter "auth" and in value box enter the copied string from the software as shown below:

add premium hotfile cookie
Add premium cookie to cookie manager

7. Now Go to mozilla firefox and refresh the hotfile page and enjoy the premium account features and download unlimited using the premium account cookie hack. Here is the proof:

premium account of hotfile for free
Premium account after premium account cookie manipulation

Note: Some time it happens that password has been changed or it shows free account. Then don't worry it will still work you need to go to software and Click on update and then generate a new cookie and add that premium cookie to cookie manager and again refresh the page.
Also you need do the steps after authorization code whenever you IP address changes.

It's a 100% working hack. I hope you all have liked it.
If you have any queries ask me in form of comments and if you really liked it please comment as i have put my lot of time in writing this tutorial :P....
How to hack Orkut account or password | Hacking orkut online

How to hack Orkut account or password | Hacking orkut online

Hello friends, in my previous article about "How hack gmail account or password" i have explained about how to hack gmail account or password using Phishing. Similarly we can use Phishing technique to hack Orkut account or password online the only thing differ is that we only need a new Phisher for Orkut hacking. Almost all phishers of Orkut are outdated so they can be easily identified by people, so i have made the new one for you guys. So in this tutorial i have come up with latest Orkut Phisher that looks absolutely similar to the original page. So guys read on how to hack orkut account or password online.

Note: This is for Educational Purposes only. Please Don't misuse it. You will be solely responsible for any misuse.

As i always start my tutorial with brief introduction about the topic, so let's discuss again what actually is phishing.

What is Phishing?
First of you must know what are phish pages, phish pages are the fake pages that are intentionally made to steal the credentials of the victim and hack his personal details. The process of making Phish pages and sending it user makes it a complete technique called Phishing. Technically Phishing is a technique to hack victims account password using the phish or fake pages. In phishing we sent the fake page links to the victim in spoofed manner so that we will not able to recognize that the page is real or fake. Now when victim enters his credentials in the fake page two different process occurs simultaneously. First it writes a log file having username and password and second process redirects the user to the original website page with username entered and displaying password is incorrect. 

How to recognize Phish Pages?
There are three possible ways to recognize the Phish pages and all three ways depends on the awareness of the user. There are some other ways also to protect yourself from Phishing but as we Prevention is better that cure. If you know how its done then surely you will also know what are its loopholes and how can we detect it and block it.

Ways to recognize Phish Page:
1. Check the Address bar, if the URL you are visiting does not match with the original website link then its a fake page.
2. If you are a great coder or understands HTML well then you can easily revert back the attack and check the hackers hacked log file. But if you by mistake entered your own details it cannot be deleted. For this you need to use IDM and run the website grabber. There in log file you can see all details of the accounts that hacker has hacked.
3. You can also install some good web security toolbar like AVG, crawler etc that will instantly show that its a fake page or original orkut page. 

Now let's get back to the topic how we can hack orkut account or passwords using Phishing. In the steps below i have explained each and every step involved in hacking orkut account password online. So read them carefully and also try to explore some more things.
Like in my previous post i have forgot to tell you that you need to set the read, write and execute rights on the files. Note: Log file should not have read and execute rights when you upload them to web hosting server otherwise everyone can view your file that contain the hacked accounts. 
Be smarter Guys try to explore things by yourself. I can only tell you the way, it's you will walk the road and face the challenges.

Steps to Hack Orkut Account Password Online:
1. Download the Orkut Phisher (Click here to Download).
2. Extract the zip file and now you will get three files namely:
  • Index.htm
  • Isoftdl_log.txt
  • next.php
3. Now go to Free Hosting website and register a new account on it.
4. After registering Go to File Manager on the website and Create a new directory name it as Orkut or whatever you wish.
5. Now open the directory by double Click on the directory and click on Upload. Now browse the three different files one by one from three upload boxes and click on upload.
6. Now Open the Index.htm page and you will see your fake page which looks absolutely similar to Orkut original page. Below is the Snapshot of Fake Orkut Page:

Hacking orkut account or password online
How to hack Orkut account using Phishing

7. You can directly send the above URL  to the victim but its quite detectable. So we need to spoof it. So that become little bit difficult for victim to recognize it. For that visit tk domain maker website(click here to visit).

8. Now Send the Spoofed link in the mail to the victim.

9. Now when user login using the fake page the data in log file is written which will look like below:
hack or crack orkut account password online
Hacking Orkut password online using Phising

10. That's all friends now you have the user name password of the victim.

So isn't that an easy method to hack Orkut account password online with ease and the method you already know.

I hope you all have liked the topic and new additions. If you have any queries ask me in form of comments.

How to Hack Gmail Account password online

How to Hack Gmail Account password online

Hello friends, in my previous article about "How hack email account" i have explained all the possible ways to hack an email account. In my previous tutorial about phishing " How to hack gmail account or password" i have explained how to hack gmail account or password using phishing technique.  But now that phisher has been outdated and now most of free web hosting servers nowadays does not allow to create text file. So in this tutorial i have come up with latest Gmail Phisher and new free web hosting servers. So guys read on..

Note: This is for Educational Purposes only. Please Don't misuse it. You will be solely responsible for any misuse.

Hack gmail account password online
How to hack Gmail account or password

As i always start my tutorial with brief introduction about the topic, so let's discuss again what actually is phishing.

What is Phishing?
Phishing in normal words is a word derived from the word fishing. As in fishing we make a trap for the fish to get caught similarly in case of Phishing we make a trap to hack the user password. Phish basically means fake, things that are deviating from original product. Technically Phishing is a technique to hack victims account password using the phish or fake pages. In phishing we sent the fake page links to the victim in spoofed manner so that we will not able to recognize that the page is real or fake. Now when victim enters his credentials in the fake page two different process occurs simultaneously. First it writes a log file having username and password and second process redirects the user to the original website page with username entered and displaying password is incorrect. 

How to recognize Phish Pages?
There are two ways to recognize the Phish pages and both depends on the awareness of the user. There are some other ways also to protect yourself from Phishing but as we Prevention is better that cure. If you know how its done then surely you will also know what are its loopholes and how can we detect it.

Ways to recognize Phish Page:
1. Check the Address bar, if the URL you are visiting does not match with the original website link then its a fake page.
2. If you are a great coder or understands HTML well then you can easily revert back the attack and check the hackers hacked log file. But if you by mistake entered your own details it cannot be deleted. For this you need to use IDM and run the website grabber. There in log file you can see all details of the accounts that hacker has hacked.

What's new features in this Gmail phisher?
Since its a new phisher so friends there should be something new in it. Isn't it. Yups, what do you think i have added in this phisher. 
I have added few awesome features in this phisher and list is below:
1. Incorrect password shown page bug removed
Previously what happens when user login using phisher it redirects to the original page and displays password is incorrect. But now it doesn't show that but even do more smarter thing... As for phishing account we have to sent the email to victim, and now if victim has read the mail that means he is already login so what i have done i have utilized the cookie hack and result is guess what, when victim login using fake page he login's in to his own original account without even showing any message or anything. Technically its called Tabnabbing another name of advanced Phishing.

2. Log File Contains more additional Information
I am sure you will love this information what more log file contains. Previously it only contains the username and password. Now log file contains all the cookie details along with IP address of the victim. And now why it becomes more significant. Previously what happens some good people means people that know phishing technique login's through the Phish page but enters the wrong credentials and use some abusive words in login. Now when they type that also i will get their Magic cookie or simply called session cookie and IP address that i can use to hack their PC and account.


Steps to Hack Gmail Account Password Online:
1. Download the Gmail Phisher (Click here to Download).
2. Extract the rar file and now you will get three files namely:
  • Index.htm
  • Isoftdl_log.txt
  • next.php
3. Now go to Free Hosting website and register a new account on it.
4. After registering Go to File Manager on the website and Create a new directory name it as Gmail of whatever you want.
5. Now double Click on the directory to open it and click on Upload. Now browse the three different files one by one from three upload boxes and click on upload.
6. Now Open the Index.htm page and you will see your fake page which looks absolutely similar to Gmail original page. Below is the Snapshot of Fake Gmail Page:

Hack Gmail using Phishing demo
How to hack Gmail account password online : Fake Page

7. You can directly send the above URL  to the victim but its quite detectable. So we need to spoof it. So that become little bit difficult for victim to recognize it. For that visit tk domain maker website(click here to visit).
This i have already explained in the previous article : Hack Gmail Account Step by Step

8. Now Send the Spoofed link in the mail to the victim as i have explained in the Post Hack Gmail Account Step by step.

9. Now when user login using the fake page the data in log file is written which will look like below:

learn how to hack gmail account using phishing
How to hack gmail password : Log file

10. That's all friends now you have the user name password of the victim.

I hope you all have liked the topic and new additions. If you have any queries ask me in form of comments.

How to send Fake or anonymous mails

How to send Fake or anonymous mails

Hello friends, today i am going to explain you how to send fake or anonymous mails to anyone using anyone's email ID and in this more cool feature is that with attachments. Fake mailing is really helpful for Phishing attempts, as we can send emails without even using our email ID. In technical terms fake mailing is called email spoofing. That i have already discussed in Hacking class 21 : Email Spoofing. If you forgot then let me provide you brief information again.

Note: This is for educational purposes only. Please Don't misuse it.

What is fake emails or Email Spoofing or forging?
Email spoofing refers to the process of sending an email message from one source, but making it appear as though the email was sent from a different source. For example, an email originates from user@domain.com but it appears to be from email@address.com. Another method of spoofing is to make the message appear to come from an unknown user within your domain name. For example, the message appears to be from support@yourdomain.com.
This does not mean that your email account was compromised. It means that the sender has fooled the mail client into believing the email originated from a different address.
This is usually done for malicious reasons, either to distribute unsolicited email or to distribute email viruses. Unfortunately, there is no real way to prevent spoofing from occurring. If you receive an email that has questionable content, it is recommended to delete the email message or use an antivirus program to scan the message before opening it.

Lets today discuss how to do it. I will explain this tutorial using Emkei's Fake mailer.

Steps to send fake or anonymous emails:
1. Go the Emkei's Fake mailer website (click here to visit).
Now you will see something like this:

send fake or anonymous emails, fake mailer
Fake mailer to send fake or anonymous mails

2. Now as you see there are several boxes like:
a. From Name: Name of person from which you are sending the email. Put the senders Name there.
b. From Email: Email of sender that is from which email address you are sending fake or anonymous email. Note: This email address should be in friends list of victim.
c. To: In this box you have to put the email address whom you want to send the fake mail.
d. Subject : In this box here you have to enter the subject of email that you want to send, its like subject of normal emails.
e. Attachment: Select the file that you want to attach.
f.  X-mailer: Select the service from which you want to send.
g. Text/Plain or Text/Html: If you wanna wanna send normal text mail select text/Plain and if you wanna send phish mails then you need to select Text/Html.
h. Text : Here you have to enter the message you want to sent in fake mail.

3. Now enter the captcha and click on send. 
That's it, isn't that easy enough. Now let me show you the practical example of fake mailer:
Suppose i want to send an email from one of my friend's email using his email address to myself. Below is the snapshot:
sample of sending fake email, fake or anonymous mailer
Sample of how to send fake or anonymous emails

Below is the proof of fake email gone in the email address inbox. Note: The mail you are sending should be in his/her friend list.
send the fake emails, email spoofing or forging
Snapshot of email of the fake email in inbox

I hope you all have liked it.... If you have any queries ask me in form of comments.
How to increase or boost system or PC speed to maximum

How to increase or boost system or PC speed to maximum

Hello friends, today i will share with you a collection of windows tweaks that will help you to achieve maximum system or PC speed. All want that their system will work as fast as possible so why always settle for normal things, now you are learning hacking and still using your PC or system like noobs or novice guys that really not fair. So lets spend 5 minutes and get best available throughput from your Operating system. Lets start that how to increase or boost your system or PC speed to new heights..

speed up system or PC,speed browsing speed
How to Increase or boost system or PC speed to maximum

In this article i will share the following tricks to increase system speed:
 
1. Disable Autorun from all drives.
2. Speed Up Browsing speed (explore optimization).
3. Disable Indexing services.
4. Optimize Display Settings.
5. Speed up folder browsing.
6. Disable Unnecessary Services.
7. Remove annoying delete confirmation messages.


Disable Autorun from all drives
1. Go to START menu then go to RUN and type "gpedit.msc" (without quotes) and press enter.
2. Now here you will see two things first is Computer configuration and second is user configuration, you to go to both one by one.
3. First go to Computer Configuration then Go to Administrative Templates and then to System.
4. Now find the Key "Turn off Autoplay". Double click on it. Now click on Enable and select all drive and click on apply. So for computer its done, now you need to do for your own Account.
5. Second go to User Configuration --: Administrative Templates --: System --: And repeat the 4th step again.

This will disable all the auto run from your system and also help you to prevent from USB and pen drive viruses.




Speed Up Browsing speed (explore optimization)

When you connect to a web site your computer sends information back and forth. Some of this information deals with resolving the site name to an IP address, the stuff that TCP/IP really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although Windows XP and Windows XP have a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:


Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]
"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d

Make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Merge it into the registry.



Disable Indexing services

Indexing Services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy. This system process indexes and updates lists of all the files that are on your computer. It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists. If you don't search your computer often, or even if you do search often, this system service is completely unnecessary. To disable do the following:

1. Go to Start

2. Click Settings
3. Click Control Panel
4. Double-click Add/Remove Programs
5. Click the Add/Remove Window Components
6. Uncheck the Indexing services and click on next.


Optimize Display settings

Windows XP can look sexy but displaying all the visual items can waste system resources.

To optimize:

1.Go to Start
2. Click Settings
3. Click Control Panel
4. Click System
5. Click Advanced tab
6. In the Performance tab click Settings
7. Leave only the following ticked:
        - Show shadows under menus
        - Show shadows under mouse pointer
        - Show translucent selection rectangle
        - Use drop shadows for icons labels on the desktop
        - Use visual styles on windows and button.




Speed up Folder Browsing

This one is already covered by windows SP2 and SP3. But still i will share.
You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:


1. Open My Computer

2. Click on Tools menu
3. Click on Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and printers check box
6. Click Apply
7. Click Ok
8. Reboot your computer


Disable Unnecessary Services

Because Windows XP has to be all things to all people it has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:

 

Alerter
Clipbook
Computer Browser
Distributed Link Tracking Client
Fast User Switching
Help and Support - (If you use Windows Help and Support leave this enabled)
Human Interface Access Devices
Indexing Service
IPSEC Services
Messenger
Netmeeting Remote Desktop Sharing (disabled for extra security)
Portable Media Serial Number
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Remote Registry Service
Secondary Logon
Routing & Remote Access (disabled for extra security)
Server
SSDP Discovery Service - (Unplug n' Pray will disable this)
Telnet
TCP/IP NetBIOS Helper
Upload Manager
Universal Plug and Play Device Host
Windows Time
Wireless Zero Configuration (Do not disable if you use a wireless network)
Workstation

To disable these services:

Go to Start and then Run and type "services.msc"
Doubleclick on the service you want to change
Change the startup type to 'Disable".


Remove Annoying Delete Confirmation message

Although not strictly a performance tweak I love this fix as it makes my machine 'feel' faster. I hate the annoying 'are you sure?' messages that XP displays, especially if I have to use a laptop touchpad to close them. To remove these messages:
1. Right-click on the 'Recycle Bin' on the desktop and then click 'Properties'

2. Clear the 'Display Delete Confirmation Dialog' check box and click 'Ok'


If you do accidently delete a file don't worry as all is not lost. Just go to your Recycle Bin and 'Restore' the file.


Thats all friends, now you have a smart PC with maximum acheived speed without altering RAM or other stuff.


If you have any queries ask me in form of comments. I hope you all have enjoyed the topic...
Copyright © 2012 Learn How to Hack - Best Online Ethical Hacking Website All Right Reserved
Designed by Hackingloops.