Thursday, August 4, 2011

Some of the important links


These are some of the important links to some of the websites

This website contains some of the valuable information about the hacking and has some software to do it
http://www.breakthesecurity.com

This website has some of the password hacking tools which will be useful for the recovery purpose
http://passwordforensics.com/

This blog has some of the latest tips and tricks for hacking a computer and also contains some of the software to do the hacks.
http://pctipstrickshacks.blogspot.com/

This blog has the recent tips and tricks and hardware tricks for the computer
http://latest-computer-hack.blogspot.com/

This blog is useful for learning and doing the computer hacking
http://pchackerz.blogspot.com/

This blog has the latest information about the PC Video Games, Games Cheats, PS2,PS3...
http://pcgamerscafe.blogspot.com/

Then lets get some of the beauty tips here for ur skin and the face
http://beautytipsroom.blogspot.com/

This blog is the special website for the purpose of the Ethical Hacking , most of the hackers will only use these  website inorder to learn the ethical hacking tips and tricks by which u can learn to be a hacker..
http://www.progenic.com/

This blog is useful only for the hacker so that he can be able to know the latest security news..
http://www.securiteam.com/

Monday, July 25, 2011

Mail Password Decryptor


IncrediMail Password Decryptor is the FREE software to instantly recover mail account passwords from IncrediMail - a popular email client. IncrediMail stores all the configured mail account passwords in registry in an encrypted format. This software automatically discovers all such stored passwords and decrypts them.

 For each recovered mail account, it will show email address, username, password, account type (POP3/IMAP) and server information. You can recover the passwords using GUI interface as well as Command-line version - both integrated in single tool. This makes it useful tool for Penetration Testers and Forensic investigators.

IncrediMail Password Decryptor works on most of the Windows platforms starting from Windows XP to latest operating system, Windows 7.

Here are the main feature highlights
  1. Instantly decrypt and recover stored mail account passwords by IncrediMail
  2. Recover password of any length and complexity.
  3. Presents both GUI and Command-line Interface.
  4. Useful for Penetration Testers & Forensic investigators.
  5. Save the recovered password list to HTML file for transferring to other system or for future use.
  6. Support for local Installation and uninstallation of the software.


IncrediMailPasswordDecryptor is easy to use with its simple GUI interface.

Here are the brief usage details

  1. Launch IncrediMailPasswordDecryptor on your system after the installation.
  2. Next click on 'Start Recovery' button. Instantly all the stored web server login passwords will be cracked & displayed as shown in screenshot 1 below.
  3. By default passwords are not displayed being sensitive data. To view the actual password click on"Show Password" button.
  4. Finally you can save all recovered password list to HTML file by clicking on 'Export to HTML' 
Screenshot 1: IncrediMailPasswordDecryptor is showing the recovered mail account passwords fromIncrediMail



Screenshot 2: Command line usage of IncrediMailPasswordDecryptor showing various examples.
 
IncrediMailPasswordDecryptor
 
 
Screenshot 3: Exported list of of recovered passwords by IncrediMailPasswordDecryptor in HTML format.
 
Exported IM Accounts to HTML


Saturday, July 23, 2011

hacking yahoo mail - Password finder





YahooPasswordDecryptor is the FREE software to instantly recover Yahoo Loginpasswords stored by popular web browsers and instant messengers. Most of these applications store the login passwords so that user don't have to remember and enter the password every time. Each of these use their own local storage format and proprietary encryption mechanism to store the login passwords. YahooPasswordDecryptor automatically crawls through each of these applications and instantly recovers all of the stored Yahoo Login passwords.

YahooPasswordDecryptor presents both GUI interface as well as command line version, the later is more helpful for Penetration testers in their work. Apart from normal users who can use it to recover their lost password, it can come in handy for Forensic officials who can get hold of any stored Yahoo Login passwords and then use that information to extend their investigation.

YahooPasswordDecryptor is fully Portable software which can be directly run anywhere without installing locally. It also comes with Installer for those who wants to install it locally and use it on regular basis. It works on wide range of platforms starting from Windows XP to latest operating system Windows 7.



YahooPasswordDecryptor supports recovery of Yahoo Login passwords from these applications
Firefox
Internet Explorer
Google Chrome
Opera
Apple Safari
Flock Browser
PaltalkScene IM
Pidgin (Formerly Gaim)Messenger
Miranda Messenger

Note that it is not possible to decrypt the password storedy by Yahoo Messenger as it does not store the password directly. You can find more details here.

Here are the highlights of top features of YahooPasswordDecryptor which makes it stand apart from other similar tools including commercial ones.
Instantly decrypt and recover stored encrypted passwords from popular web browsers & messengers.

Comes with both GUI interface as well as Command-line version.

Recover password of any length and complexity.

Automatically discovers all supported Applications and recovers all the stored passwords.

Sort feature to arrange the recovered passwords in various order to make it easier to search through 100's of entries.

Save the recovered password list to HTML file for transferring to other system or for future use.

Easier and faster to use with its enhanced user friendly GUI interface.

Support for local Installation and uninstallation of the software.

Completely Portable Software which also comes with optional Installer for assisting you in local Installation & Uninstallation.


Password hacking tool (free)



AsteriskPasswordSpy is the FREE tool to instantly reveal the hidden password behind asterisks (*****). It's user friendly interface can help you to easily find the passwords from any Windows based application.You can simply drag the 'search icon' to any password box to find the real password hidden by those asterisks.



Most applications do not display real password in the login box for security reasons and instead they show the asterisks (****). But often there is need to know the actual password especially if you have forgotten password that you have entered while ago.

In such cases, AsteriskPasswordSpy will help you to easily find out the real password hidden behind asterisks.

AsteriskPasswordSpy comes with Installer for local installation & un-installation. It works on wide range of platforms starting from Windows XP to latest operating system Windows 7.



Features of AsteriskPasswordSpy

Here are some of the smart features of AsteriskPasswordSpy

Instantly reveal the hidden password behind asterisks.
Support most of the windows based applications
Nice user friendly GUI interface makes it easier & faster
Show password of any length & complexity
Sort feature to quickly arrange and search through discovered passwords.
Save the recovered password list to HTML file.
Support for local Installation and uninstallation of the software.


Installing AsteriskPasswordSpy

AsteriskPasswordSpy comes with Installer so that you can install it locally on your system for regular usage. It has intuitive setup wizard (as shown in the screenshot below) which guides you through series of steps in completion of installation. At any point of time you can use Uninstaller to remove the software from the system.





Using AsteriskPasswordSpy

AsteriskPasswordSpy is easy to use with its simple GUI interface.

Here are the brief usage details


Launch AsteriskPasswordSpy on your system
Now simply drag the 'search icon' to any password box to reveal the passwords.
When you place it over the password box, it will automatically highlight it and password is added to list as shown in the screenshot below.
Finally you can save all recovered password list to HTML file by clicking on 'Export' button.


Screenshots of AsteriskPasswordSpy

Here are the screenshots of AsteriskPasswordSpy

Screenshot 1:AsteriskPasswordSpy is showing all the recovered passwords from password boxes of various Windows applications.




Screenshot 2: AsteriskPasswordSpy is trying to get the password from Google Talk login box




Screenshot 3: Exported list of of recovered passwords by AsteriskPasswordSpy in HTML format.





Known Limitations


It does not work with non-windows based applications such as GTK, Flash, Adobe Air or applications not using standard edit box for the password.
Also it will not work with the application where password is not actually present. Some times applications do not put password in the password box to hide from these tools.
It does not work with HTML pages in the browsers such as IE, Firefox etc. Support for the same is planned for the future releases.


Release History


Version 1.0 : 2nd April 2011
First public release of AsteriskPasswordSpy

Click here to download

How to hack any Mail

phishing image
Hi friends ,  you may have known about how to create phishing web Page.  If you don't know about Phishing Web Page, you need to read this tutorials first:

Once you know the basics of Phishing web Page ,come to this post.

Ok friends, there's one drawback in our traditional Phishing web page method. You know what is it? You are right, the url of our phishing web page. It may look like the real one,but it is not.


For eg: we may create the Phishing web page with www.gmails.com but it's not at all same as www.gmail.com

Probably, the experienced internet users will notice the URL of web Page. So they won't fall in our Fishnet.

What we are going to do now?
Why should not we make the phishing web page's URL looks exactly same as the real Domain Name? You may ask "is it possible?". My answer is yes, you can. It sounds good na? go ahead.

How we are going to implement?

 We are going to send an email with an executable to victim.
If the victim double click the executable file, then you are done.
Now whenever the victim enter the real domain name (like www.facebook.com) ,he will be in our phishing web page.
Don't worry the domain name is original URL(like www.facebook.com)

Got surprised....!!!! You may ask how this is done,go ahead.

How it is done? 
   Executable file will change the Host file of Victim system. 
What is host file?
     The host file contains Domain Name and IP address associated with them.  Your host file will be in this path:
C:\Windows\System32\drivers\etc\

Whenever we enter the Domain name or URL (for eg: www.webaddress.com), a query will be send to the DNS (Domain Name server).  This DNS connect to the IP address which is associated with the Domain Name.   But before this to be done, the host file in our system will check for the IP address associated with the Domain Name.  Suppose we make an entry with Domain Name and IP address of our phishing web page(for  eg: www.webaddress.com wiht our ip 123.23.X.X),then there's no query will be send to the DNS.
It will automatically connect to the IP address associated with the Domain Name.  This will fruitful for us to mask the PHISHING web page's URL with Original Domain Name.


Now Let's divide into the Implementation:
  • If you are hosting some other hosting site, probably you won't get the unique IP address for your Phishing Web Page. You can have the IP Address of the hosting only. So if you try to use that IP address, the victim will not bring to your Phishing web page , they will bring to the hosting address. 

So what you can do overcome this problem? You need to set up your own Webserver in home. Using Webserver softwares you can set up your own Hosting service.

  Your computer should be turned on always. Because if you turned off the computer,then probably host will not be in online. Again it will be available when you turned on. So your computer turned on when victim visits your site.


How To set up Your own server?
  Download the  Webserver softwares like WAMP,XAMP(Both are open source software, I meant they are free ).  My suggestion is WAMP.  Because it is my favorite one.  It is easy to use.

Downlad the wamp server from http://www.wampserver.com/

Install the WAMP server.  After installation completed, Go to this folder path:
C:\Wamp\WWW
And paste your phishing web page here.

Start the Wamp Server.
(Start->windows->All Programs->Wamp Server->start wamp server)

you can see the half circle icon(wamp server icon) in system tray(i mean near to the time). Click the icon and select the start all services.

Now type your ip address in address bar of the web browser and hit enter. If you don't know your ip address ,visit www.whatismyip.com.

Now you can see your Phishing web page in your Browser.

Modifying the Host file :
 Copy the Host file from this path "C:\WINDOWS\system32\drivers\etc" to desktop.  Right click on the host file and open with Notepad.

You can see the localhost entry there.
Below that type as :
your_ip     domain_name
For eg:
123.xx.xx.xx www.gmail.com
.
 Save the File.

Compress the Host File:

    Compress hosts file such that when victim opens it, it automatically gets copied to default
location C:\Windows\system32\drivers\etc and victim's hosts file get replaced by our modified hosts file.
 
Right click on the Hosts file and select the Add to archieve option.  Now follow the steps which is shown in picture:







Now send the zipped file to victim.  If he extract the zip file, then the hosts file will be replaced.
You are done.  Now whenever he try to visit the genuine or original website, the phishing webpage only will be shown.


Some Disadvantages of this Hack:
  •    If your IP address is dynamically changed ,then it is hard to implement it
  •   If your victim is advanced user,he may notice the certificates of site which is shown by browser.
Don't worry it is not at all big problem.   Just try it ane enjoy it.

No Registration - send Anonymous Sms

How to use Proxifier to Hack the Airtel GPRS

In my last post i told you to use to hack the Airtel GPRS use Proxifier.  But i didn't tell you the procedure.  so here is the steps to set up the proxifier.

connect your mobile in pc suite mode.  Set access point as "airtelfun.com" and dial.  It will connect.  In order to make it work follow this steps.

Unzip the downloaded file (Before see this post).

You can find this files in that folder:

double click the Proxy Checker. Then this window will open

click the Proxy server Button.  small window open fill the form as shown in this picture:







Click ok then it will ask you "do you wan to specify ? yes or no".  click the "NO" button.





Then click the Test settings. and fill the form as shown in the following picture:

Finallly click the Start the Testing.  that's all now you can use the Airtel Live in the mobile:


Set the Airtel Live settings in mobile (address is :airtelfun.com)