Ethical hacking ebooks| tips and tricks| windows tricks| software| mobile| infotechno| free download with full version| games| ipad and; iphone|Android| google | java | c language | mobile | facebook | whatsapp | Earn money


4 Ways To Hack Facebook Account

6/18/2012

Today, I am going to tut u about faceb0ok account hacking. Here I will tut u about 5 advance method with the help of which you can hack ur enemy's facebook password.

I will cover 4 methods over here:

1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack
5.   Cookie Stealing

you may also read this :-

Hack A Facebook Account With ARP Poisoning

How to Hack Facebook Status by SMS Spoofing

Facebook phishing:



I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. 

what is phishing?

Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. However phishing requires specialized knowledge and high level skills to implement. So I recommend the use of Phishing to hack facebook account since it is the easiest one.

Phishing Procedure
:

First of all download
Facebook fake login page

1.
once you have downloded facebook fake login page now extract contents in a folder

2.
Now open pass.php and find (CTRL+F) 'http://infototechno.blogspot.com' then change it to your to is the 'http://www.google.com.bg'

Note:
'http://www.google.com' is the redirection url,When victim will enter his/her email and password he will redirected to'http://www.google.com.bg' instead of "http://infototechno.blogspot.in"

Now Save it .


3
.Now open facebook fake page in a wordpad

4.
Now in the fake page press Ctrl+F and search for the term "action=" now change its value to pass.php i.e. action=pass.php



5. Create an id in www.110mb.com,www.ripway.com or t35.com.

Note:
Lots of people have complaint that they get banned from 110mb.com.ripway.com and t35.com so as an alternative you can use ooowebhost.

6.
Then upload all the files Facebook.htm,Pass.php in 110mb directory or an other and just test it by going to http://yoursite.110mb.com/Facebook.htm for the fake login page.Just type some info into the text box and then you will see in your file manager that a file called "Facebook.txt" is created, In which the password is stored

7.
Go to http://yoursite.110mb.com/Facebookpassword.htm for the stored passwords !

and see you got the password

 Keylogging:


This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password.

Best KeyloggersWinspy Keylogger, SniperSpy

3. Social engineering:

This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


4.Primary email address hack

So far, i found these Facebook hacking methods as best and working ways to hack facebook account passwords. I never encourage hacking Facebook or any email account,,I just wanna make you aware about Facebook dangers online. I will appreciate your effort if you mention any other Facebook hacking method. 

5. Facebook Cookie Stealing 

I am updating this post with a new method which is being used to hack facebook accounts, which I think is very effective, Facebook cookie stealing is becoming popular day by day.The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account

Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;

CEH Official Certified Ethical Hacker Review Guide

6/18/2012

The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks. Written by bestselling certification author Todd Lammle, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review. The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Council's CEH training.

Get Serial NO. of Any Software through Google

6/11/2012

What is Serial No. -

A serial number is a unique code assigned for identification of a single unit. Although usually called a number, it may include letters, though ending with digits. Typically serial numbers of a production run are incremented by one, or another fixed difference, from one unit to the next. Units may be marked with several alphanumeric codes, but only one of these will be a serial number; others are sometimes called nominal numbers, and may identify the part, specify installed options, and so on.
 - wikipedia


A Short Trick

                     Go to Google
                     Type this syntax in search bar " 94FBR "

Replace Product name with desired software and leave     a space then type   94FBR




Press enter, thats it

Now you receive Many pages which contains Serial no, Crack, Patches....





How to Get YOUR FRIEND'S IP Address STEP BY STEP

6/11/2012

First Method

is help of cmd commad netstat

open ur cmd type in netstat help to get all the commands and to find ip use netstat -a

share as many things with victim like photos, song or any other type of file

when ur sharing then open cmd type in netstat -an and all the list will come and see the establishment and you will get the ip

Other netstat commands:

-a   Displays all connections and listening ports.
-e   Displays Ethernet statistics. This may be combined with the -s option.
-n   Displays addresses and port numbers in numerical form.
-p   Proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s   Option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r   Displays the routing table.
-s  Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p  Option may be used to specify a subset of the default.


Second method is the help of websites

I give you two websites that help you to find the ip address

here are the links

http://shivampatel.net/trace/

http://whatstheirip.com/

open these websites and read the instructions you will get to know how to do it.

NotePad Tricks To Scare Your Friends

6/10/2012


Most of you must be aware about a tool called notepad. It is a simple text based editor. But today I am going to discuss some cool tricks which you can perform on your computer using notepad. You can also use these tricks to scare your friends.

FOR MESSAGE BOX:

TYPE:

@ECHO off

:Begin

msg * Hi

msg * Are you having fun?

msg * I am!

msg * Lets have fun together!

msg * Because you have been o-w-n-e-d

GOTO BEGIN


Save it as pc.bat and send it to your friends.

___________________________________________________________________________


Make Keyboard Keys Type Continuously:

Type :

MsgBox “stop me..! if you can”

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{bs}”

loop


Save it as pc.vbs and send it to your friends.

_____________________________________________________________________________


Convey your friend a message and shut down his/ her computer.

Type :

@echo off

msg * I don’t like you

shutdown -c “Hahahah You are Doomed” -s

Save it as pc.bat and send it to your friends.



_______________________________________________________________________________



Toggle your friend’s Caps Lock button simultaneously

Type :

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do 

wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}” 

loop


Save it as pc.vbs and send it to your friends.
______________________________________________________________________________


Frustrate your friend by making their keyboard hit Enter simultaneously whenever they press a key :

Type :

Set wshShell = wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “~(enter)”

loop


Save it as pc.vbs and send it to your friends.

________________________________________________________________________________


Hack your friend’s keyboard and make him type “You are a fool” simultaneously:

Type : 

Set wshShell = wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “You are a fool.”

loop


Save it as pc.vbs and send it to your friends.

________________________________________________________________________________

Open Notepad, slowly type anythingand freak your friends out:
Type :

WScript.Sleep 180000

WScript.Sleep 10000

Set WshShell = WScript.CreateObject(“WScript.Shell”)

WshShell.Run “notepad”

WScript.Sleep 100

WshShell.AppActivate “Notepad”

WScript.Sleep 500

WshShell.SendKeys “Hel”

WScript.Sleep 500

WshShell.SendKeys “lo “

WScript.Sleep 500

WshShell.SendKeys “, ho”

WScript.Sleep 500

WshShell.SendKeys “w a”

WScript.Sleep 500

WshShell.SendKeys “re “

WScript.Sleep 500

WshShell.SendKeys “you”

WScript.Sleep 500

WshShell.SendKeys “? “

WScript.Sleep 500

WshShell.SendKeys “I a”

WScript.Sleep 500

WshShell.SendKeys “m g”

WScript.Sleep 500

WshShell.SendKeys “ood”

WScript.Sleep 500

WshShell.SendKeys ” th”

WScript.Sleep 500

WshShell.SendKeys “ank”

WScript.Sleep 500

WshShell.SendKeys “s! “



Save it as pc.vbs and send it to your friends.
____________________________________________________________________________

Frustrate your friend by making their keyboard hit Backspace simultaneously whenever they press a key :
Type :

MsgBox “Let’s rock and roll”

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{bs}”

loop



Save it as pc.vbs and send it to your friends. 
____________________________________________________________________________

Open Notepad continuously in your friend’s computer:

Type :

@ECHO off

:top

START %SystemRoot%\system32\notepad.exe

GOTO top

Save it as pc.bat and send it.
______________________________________________________________________________

Continuously pop out your friend’s CD or DVD Drive.

Type :

Set oWMP = CreateObject(“WMPlayer.OCX.7″)

Set colCDROMs = oWMP.cdromCollection

do

if colCDROMs.Count >= 1 then

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

End If

wscript.sleep 5000

loop



Save it as pc.vbs and send it to your friends.
___________________________________________________________________________

How to Make Your PC Virus Free

6/10/2012

1. E-mails:
This is the most of the common way through which spywares, worms, Trojans and viruses find their easy way into your computer. When you have your own private emails, increase the privacy settings and never ever open unsolicited and unknown emails, as they may be the source of the much awaiting harms that can damage your whole computer. To avoid this harming your computer, use very good anti-spam software. Never click links in e-mails if you are not sure what are they.


                                               

2. USB thumb or pen drives:
This is another and most common source that could affect your computer in a number of ways. The best option to avoid this from happening is by performing a virus scan before copying any data onto your computer and another small tip is not to double click the pen drive for opening. Use right click to open or explore the files in the drive before opening is the best alternative.

3. Use of MS Outlook:
It is not known that MS Outlook could be a source and the best way to spread and hack into your computer, unless you have a real time antivirus programs running. Alternatives to MS Outlook will include the use Windows Mail (which can even identify spam emails from known sources), Pegasus of thunderbird, or web based programs like hotmail or Yahoo.

4. Internet or World Wide Web:
Even a basic computer user knows that internet is the best way to spread viruses like pandemic and are the main sources of malicious programs like viruses, worms, Trojans, etc., which can range up to 80 percent of the worldwide transfer during surfing of the web. By following some of the best surfing habits this danger could be waded off, which will include by not clicking the pop-up windows or by using pop-up blockers.

5. Search Engines:
Most of us surf the web using mostly with the help of search engines, and one of the best ways either to prevent from visiting malicious website from being listed in your search or to point them out when listed, is by installing some powerful scanners like AVG Link scanner, which is a free ware. Even Mozilla says if a site will harm your computer or not.

6. Use a good antivirus:
If you are looking for one solution that can do most of the jobs mentioned so far, it is also good for preventing from someone else stealing your personal information like online identity, credit card information, password stealing and many other such activities. So always use a powerful antivirus.

Comments are always appreciated!!

How To Detect That a Keylogger is Installed on a Computer or Not

6/10/2012

Key loggers are software that traces the key strokes on your computer. It is done in such a way that a person using the computer is unaware of the fact that a key logger is installed on a particular PC.

How does keyloggers enters your computer ?


There are several ways in which a key logger can get into your computer either it is directly installed or it is indirectly transferred to your computer. Most of the time, this malicious file enters a computer when the user downloads an infected application like movies, music or other software applications.
So how to get rid of keyloggers that is installed on a computer


1. Use updated antivirus and anti spyware

Some of the good anti viruses have capability to detect key loggers. So you should update your antiviruses regularly so that it gets updated for new keyloggers.


2. Use Anti keyloggers

There are anti keyloggers available that will make the task easy for you in finding a keyloggers. Use these softwares if you think there is a high possibility of keyloggers on a computer. The anti keyloggers that i will suggest you is Cyberhawk. Even Kasperky does a good job in this area too. Also check anti-spy.info. More examples:

http://www.microsoft.com/athome/security/spyware/software/default.mspx
http://www.lavasoftusa.com/software/adaware/

3. Search for keyloggers yourself

Keyloggers have the capability that they hide them self from the user but are active in the background. There are some shortcuts that are used to see them live on screen

For example : Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X or desktopshark etc.

4. Use special tools

SnoopFree

Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.

PSMAntiKeyLogger

PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.

Security cameras on internet through Google

6/10/2012

Here’s a trick that will blow your mind. You can get access to all open public webcams through Google. There are many tricks by which one may get accessed to all the webcams running currently at a particular position and at particular time. However the Google Webcam trick seems to be one the easiest. Here are a simple few steps by which one may do the same.



Step 1. Open internet your web browser.
Step 2. Go to a search engine of your choice (i.e. Google, Yahoo, etc.), and input any of the search commands as listed below.
Step 3. After you search one of these queries, you will see some search results, click on any one of them.
Step 4. Depending on the type of camera that you have access to, you may be able to control the camera like zoom, pan, and tilt the camera to see what you want to.
Step 5. Do not try to get onto password protected cameras, as this will not go unnoticed if too many attempts are made

Some Commands to be Remember to Find Live CCTV Cameras.

 inurl:/view.shtml
 intitle:”Live View / – AXIS” | inurl:view/view.shtml^
 inurl:ViewerFrame?Mode=
 inurl:ViewerFrame?Mode=Refresh
 inurl:axis-cgi/jpg
 inurl:view/index.shtml
 inurl:view/view.shtml
 liveapplet
 intitle:liveapplet
 allintitle:”Network Camera NetworkCamera”
 intitle:axis intitle:”video server”
 intitle:liveapplet inurl:LvAppl
 intitle:”EvoCam” inurl:”webcam.html”
 intitle:”Live NetSnap Cam-Server feed”
 intitle:”Live View / – AXIS 206M”
 intitle:”Live View / – AXIS 206W”
 intitle:”Live View / – AXIS 210″
 inurl:indexFrame.shtml Axis
 intitle:start inurl:cgistart
 intitle:”WJ-NT104 Main Page”
 intitle:snc-z20 inurl:home/
 intitle:snc-cs3 inurl:home/
 intitle:snc-rz30 inurl:home/
 intitle:”sony network camera snc-p1″
 viewnetcam.com
 intitle:”Toshiba Network Camera” user login
 intitle:”i-Catcher Console – Web Monitor”


Use these commands in Google Search and get the desired result.

How TO Install DropBox

6/06/2012

How does Dropbox work?

At its most basic level, Dropbox is just another folder on your computer, and appears just like any other folder on your computer. However, the exception to a Dropbox folder is that any files you store in this folder are automatically synchronised with any other computer or device which you have linked to your Dropbox account. As such any changes, additions, deletions to files are synchronised too.
Imagine you have installed Dropbox on your computer in the UK, and you're just about to leave for a holiday at your villa in Turkey, but you have some files you need to take with you to use on your computer in Turkey. With Dropbox, all you have to do is to copy the files to your Dropbox folder on your UK computer. Then when you get to Turkey, install Dropbox on your local computer, and then through the power of Dropbox and the internet, the files from the UK computer will 'magically' appear on the computer in Turkey.
Best of all, the basic package is free, and very easy to use.

Installing Dropbox

  1. Download full version of Dropbox from Here

  2. Fill in the "Create a Free Dropbox Account" form, Click "Create Account"
    Installing dropbox - step 1: Create an account
  3. You will now see a download screen, your download should automatically start. Once the download has finished, launch the download by clicking either "Open", or "Run", or alternatively locate the downloaded file and double-click it. The installation process should now start.

  4. If you get a warning about running the installation, just click Run.
    Installing dropbox - step 2: Windows warnings
  5. Also click past any other installation warning you receive.

  6. The installation will now start, click "Install" to start"
    Installing dropbox - step 3: Welcome to Dropbox setup
  7. Wait a couple of minutes for the installation to complete. On the next screen you will need to choose "I don't have a Dropbox account", and click "Next"
    Installing dropbox - step 4: Do you have a Dropbox account?
  8. You will now need to complete your personal information for your Dropbox account, this information is required to ensure security to your account. Please ensure you use a secure password. Click "Next" when you're done.

    Installing dropbox - step 5: Your dropbox information

  9. Wait a few seconds for the information to be submitted, you will then see the account selection screen where you can choose which level of account you would like. Chose the top (free) option: "2GB Free". Click "Next" (note: if you have used the above referral link you will actually receive 2.25GB space).
    Installing dropbox - step 6: Select your dropbox package
  10. Now choose "Typical" and click "Next"
    Installing dropbox - step 7: Choose Dropbox setup type
  11. The next few screens provide a tour - please take the time to look through this and get used to the concept of Dropbox.
  12. You're now done and can start using Dropbox!

How To Install VirtualBox on Windows 7

6/06/2012


Installing VirtualBox 4.0 on Windows 7

Download Virtual box from here


Figure 1: Choose the installation options you want for VirtualBox
You have the option to install shortcuts to the desktop and to the Quick Launch bar. In Figure 2, you’ll see that you can simply deselect the checkbox next to a selection if you don’t want that particular shortcut.



 


Figure 2: Should any shortcuts be created?

During installation, network connections will be reset and you might temporarily lose network connectivity. The screen in Figure 3 provides you with ample warning.


 

Figure 3: A warning regarding network interfaces
Once you’ve made your selections, click the Install button to proceed.


 

Figure 4: Click the Install button to proceed


At various points during the installation, the installer will ask you if you want to install device driver software. In order for VirtualBox to be feature-complete, you should click the Install button each time one of these windows (Figure 5) pops up.

Figure 5: Install device drivers
Once the process is complete, you’ll be presented with a window indicating such (Figure 6).


 













 Figure 6: The VirtualBox installation is complete



 Once the installation is complete move on to installing the VirtualBox Extension Pack. Once the file is downloaded, run it. You’ll get a screen like the one shown in Figure 7 in which you’re asked if you want to install the Extension Pack. Click the Install button to proceed. You’re also asked to agree to the extension license (not shown).



Figure 7:
Install VirtualBox Extensions
Verify that the extensions have been successfully installed by going to File > Preferences > Extensions. You’ll get a list of the extensions that have been installed on your system.


 

Figure 8: The extension was successfully installed

also read ....

Run Two OS Simultaneously With Virtual Box



Make Windows 7 Genuine

6/04/2012

WGAWindows Loader is an application used to bypass WAT (Windows Activation Technologies). The application itself injects a SLIC (System Licensed Internal Code) into your system before Windows boots , because of which your windows behaves as a genuine copy. 


Supported operating systems :

  • Windows 7 Ultimate
  • Windows 7 Ultimate E
  • Windows 7 Professional
  • Windows 7 Professional E
  • Windows 7 Home Premium
  • Windows 7 Home Premium E
  • Windows 7 Home Basic
  • Windows 7 Starter
  • Windows 7 Starter E
  • Windows Vista Ultimate
  • Windows Vista Business
  • Windows Vista Business N
  • Windows Vista Home Premium
  • Windows Vista Home Basic
  • Windows Vista Home Basic N
  • Windows Vista Starter
  • Windows Server 2008 Enterprise
  • Windows Server 2008 Enterprise (Hyper-V)
  • Windows Server 2008 Foundation
  • Windows Server 2008 Standard
  • Windows Small Business Server 2008
  • Windows Storage Server 2008 Standard
  • Windows Server 2008 R2 Enterprise
  • Windows Server 2008 R2 Foundation
  • Windows Server 2008 R2 Standard
  • Windows Small Business Server 2011 Standard
Loader

Note : Turn Off your antivirus before downloading and turn it on after installing the loader.
Compatible with both 32 and 64 bit systems.

Download Windows Loader v2.0.9