Hey all geeks,
Sorry for being away for almost a month, but guess what , got many new tricks & hacks with me for all of you.
So here is a quick new hack on how to intrude in the PC which is shut downed at Cyber cafe. (Don’t Forget to read our disclaimer at the bottom of the post.)
1. As you all must have know these days all Cyber cafe owners have a program for administration to control all PC’s in local area network. So all files can be inter transmitted.
2. First of all press Ctrl+Alt+Del the task manager or any controlling application, will open. Then from APPLICATIONS select the program that is controlling all PC’s & terminate it, This is for security reason. Now log of PC, & you ll get user names of the PC.
3. But some times, cyber cafes have security clients installed that have restricted access to Task Manager, restart the computer & press F8 continuously before windows boots.
The Menu will open, select Safe Mode from it. And now you can copy files from networked PC’s without any security layer.
Next step is where you’ll need to crack the hashes. SO go to your home PC , Download & install Saminside cracking tool. And from some another Cyber cafe try to crack the hashes of that PC. By same log off method explained below.
This where you actually perform hacking. Have a gret time & tell us weather it worked for you.
Meanwhile if you can get IP address, of the PC you wish to hack try to get it from ip-explorer.com, but this is not the part of this hack its sort of next step of hacking from outside the network.
Disclaimer : The trick here explained it for educational purpose only & not to perform illegal or criminal activities. Don’t forget hacking into some one’s privacy is considered as crime. SO do it on your home network that you own or something. We, kapilhacker8286.blogspot.com are not responsible for anything you do & consequences of it by using our articles.
WELCOME TO THE HACKER's WORLD. HERE YOU WILL GET HACKING TIPS & TRICKS,LEARN HOW TO HACK
hackers Search
Wednesday, June 1, 2011
Indian Hacker V/S Pakistani Hacker
i guess we have been all familiar about,late last month Indian Hackers paid homage to
the martyrs of India who gave their life in 26/11 by defacing 40 govt. websites, posting their photos and message to pakistani government "a warning against terrorist activity against India".
These defacements were happening from long time, it started near about 2001. Sometime Indian hackers used to hack pakistani government sites, sometimes pakistani hackers used to hack indian sites, but none of them ever made this much news. BUT recent defacement caught fire in media, every body started praising Indian Hackers. But this was not end, Pakistani hackers thought of taking revenge , which they did by defacing 1000+ Indian sites including CBI one, POSTING a aggressive message, showing them that they can deface 1000 + websites, probably ling to their own people that even they can deface. But being frank defacement can be even carried out by 10 yr old guy, which was proven by ICA by defacing more than 1000+ pakistani sites very next day telling them who is daddy here.
But point worth noting here was that ICA guys were able to hack the pakistancyberarmy.net(PCA) the group responsible for defacing 1000+ websites, while PCA was like sitting ducks.
In this short period of cyber war between India and pakistan, Indian hackers have scored on their behalf, while pakistai hackers have yet to be, but it will be foolishness to think that pakistani hackers are incapable, probably real ones havenot even shown their face, and same is the case with Indian Hackers, probably members of the group called ICW, Indian Snake, YAHA are out of seen.
So, it can be considered as very low level of cyber war, which might get fierce in coming future, probably when India and Pakistan will fight in battlefield , and their hackers will fight in Cyber Space to show their supremacy.
Pakistani hackers attack Vijay Mallya’s website
MUMBAI: Industrialist Vijay Mallya's personal website has been hacked allegedly by Pakistani hackers with "dire" threats that India's cyber space was not secured being posted on it. Mr Mallya's spokesperson Prakash Mirpuri said that a complaint in this regard would be lodged with the city police on Monday.
A PakistanI flag was also depicted on the website of Mr Mallya. "Mallya's website www.mallyainparliament.com has been hacked and the Pakistani flag has been placed with a dire message from an organisation known as the Pakistan Cyber Army," the spokesperson said.
Mr Mallya said he was shocked at the defacement of his website. "This morning when I went into my site, I was utterly shocked to see the Pakistani flag and the message," he said, adding "what was more shocking to me was to see that it was done by some Pakistani outfit."
A PakistanI flag was also depicted on the website of Mr Mallya. "Mallya's website www.mallyainparliament.com has been hacked and the Pakistani flag has been placed with a dire message from an organisation known as the Pakistan Cyber Army," the spokesperson said.
Mr Mallya said he was shocked at the defacement of his website. "This morning when I went into my site, I was utterly shocked to see the Pakistani flag and the message," he said, adding "what was more shocking to me was to see that it was done by some Pakistani outfit."
Laptop Battery Doubler v1.2(GOOD ONE)
Battery Doubler: double your battery's autonomy.
Battery Doubler can double your battery's autonomy with little to no concessions.
Install Battery Doubler, unplug AC power and experience total laptop freedom!
* Double your autonomy
Before, your only solution to have a decent battery for your laptop was to buy an extra one.
Now, there's a lighter, more efficient, and cheaper alternative: Battery Doubler!
Because it doesn't use standard techniques (dim screen light, etc.), but finds out what to turns off what isn't needed, such as, for example, the USB ports, you can get up to twice autonomy without sacrifice comfort.
* Decrease recharge time
Your battery recharges much faster if your computer isn't turned on. That's a fact.
Let Battery Doubler redefine a few computer facts - with its Turbo Charge technology, increase up to 10% battery recharge speed when your computer is turned on.
* Recalibrate damaged batteries
After using your battery a lot without paying attention to discharge and recharge it fully every time, its performance becomes very low.
With Battery Doubler, simply run the recalibration wizard that does the entire job for you - automatically!
* Easy to use
From the configuration window to the battery status indicator, features, Battery Doubler excels at ease-of use.
Our interface fully respects Microsoft's guidelines and is very intuitive.
Because you don't always want to read a 300-pages manual before using a software, you will understand how to use Battery Doubler in no time.
* And much more
Battery Doubler features other great functions, such as telling you in hours:minutes your battery's autonomy!
It is impossible to list all of Battery Doubler's functions on a single webpage, so why don't you download it and find out how much better your laptop is with it?
http://www.viciowarez.com/descargar-warez-7/laptop-battery-doubler-v1-2-1-a-77569/#post128071 DOWNLOAD LINK
CREATE FAKE LOGIN PAGE TO STEAL PASSWORDS
{1} Open www.jotform.com and Sign Up.
{2} Then Login there with your newly registered account.
{3} Now click on ' Create your first form'.
{4} Now delete all the pre-defined entries, just leave 'First Name:'. (To delete entries, select the particular entry and then click on the cross sign.)
{5} Now Click on 'First Name:' (Exactly on First Name). Now the option to Edit the First Name is activated, type there "username:" (for gmail) or YahooId: (for Yahoo)
{6} Now Click on 'Power Tool' Option (In right hand side...)
{7} Double click on 'PasswordBox'. Now Click the newly form password entry to edit it. Rename it as 'Password:'
{8} Now Click on 'Properties' Option (In right hand side...). These are the form properties.
{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.
{10} Now in ThankYou URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don't leave it blank...)
{11} Now Click on 'Save'. After saving, click on 'Source' Option.
{12} Now you can see two Options, namely 'Option1' & 'Option2'. Copy the full code of 'Option2'.
{13} Now open Notepad text editor and write the following code their.
Paste the Option2 code here
{14} And now save this as index.html. Now we have to put this index.html on internet. I mean now we are going to host this file. For this we will use FREE hosting provider service. You can try the following FREE hosting providers. Make a free hosting account and come back here...
http://www.webng.com
http://www.atspace.com
{15} I hope u have succesfully created a free hosting account. Now Login in your hosting account. And then Open 'File Manager'.
{16} Upload this index.html there... now u can see your index.html online by typing the url (url will be given to you by your free hosting provider..)
FINISHED
EHICAL HACKERS TOOLS(Tutorials and Toolz)+DOWNLOAD LINKS
Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation. When students leave this intensive five-day class, they will have hands-on understanding and experience in ethical hacking.
Chapter 1 - Introduction to Ethical Hacking
Chapter 2 - Footprinting
Chapter 3 - Scanning
Chapter 4 - Enumeration
Chapter 5 - System Hacking
Chapter 6 - Trojans and Backdoors
Chapter 7 - Sniffers
Chapter 8 - Denial of Service
Chapter 9 - Social Engineering
Chapter 10 - Session Hijacking
Chapter 11 - Hacking Web Servers
Chapter 12 - Web Application Vulnerabilities
Chapter 13 - Web Based Password Cracking Techniques
Chapter 14 - SQL Injection
Chapter 15 - Hacking Wireless Networks
Chapter 16 - Evading IDS, Firewalls and Honey Pots
Chapter 17 - Linux Hacking
Chapter 18 - Buffer Overflows
Chapter 19 - Cryptography
Chapter 20 - Virus and Worms
Chapter 21 - Physical Security
Chapter 22 - Penetration Testing
Extract the file and rename it to ISO
Code:
http://www.megaupload.com/?d=VOUDZCCD
http://www.megaupload.com/?d=S43BLLWQ
http://www.megaupload.com/?d=7BW82RQ3
http://www.megaupload.com/?d=FJTZNC39
http://www.megaupload.com/?d=HQJ26BGM
http://www.megaupload.com/?d=DN9JE0AL
Subscribe to:
Posts (Atom)