HACKING GMAIL ACCOUNTS

Gmail phisher is a phisher for hacking Gmail accounts Like Orkut Phising. Just send it to anyone and ask him to enter his login credentials. Once he enters his login details, a text file containing passwords of the user is generated automatically.

HACK HOTMAIL ACCOUNTS: Msn Hacker

I had posted already Gmail Hacker to hack Gmail accounts.With this software we can hack hotmail accounts. Run Hotmail Hacker Builder.exe file on ur pc. Enter your email address password and subject of email you want to receive Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.

TURKOJAN GOLD 4

Turkojan Gold 4 is a remote access Rat which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you can not only track every activity on the victim's PC but also you will also be able to control it whole. client contains various options for controlling the victim computer in many ways.

AIRCRACK

Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking like Airsnort, but it is more efficient as it can crack both WEP and WPA passwords. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

HACK EMAIL ACCOUNTS : 34 IN 1 PHISHER PACK

As the name says, this phisher pack consists of 34 ready made phishing pages of websites like paypal, ebay, yahoo, gmail etc.

Showing posts with label Msn Hacaking. Show all posts
Showing posts with label Msn Hacaking. Show all posts

Monday, 5 November 2012

Where to Start with hacking

Where to start with hacking?




I have seen this question so many times, “Where to start with hacking?” Now I am going to give you my opinion on where to begin. There is just one thing you should remember, “Hacking is a lifestyle”.

 There are three types of hackers:

White Hats:


 The White Hat hacker has dedicated himself to fight malware and help others with their computer problems. He is a person you can trust, and he will most likely end up in a good paying job as a computer programmer or a security consultant. He will most certainly not end up in jail.

Grey Hats:


 The Grey Hat hacker are in between white Hats and Black Hats. He will most likely commit pranks at people that he thinks is harmless, but it can also be illegal. He can at one time be helpful and help you with a computer problem, but at the same time infect you with his own virus. There is a chance that the grey hat will end up in prison.

 Black Hats:


 The Black hat hacker also known as a cracker is the one who deface websites, steal private information and such illegal activity. It is very time consuming to become a black hat. It can be very hard for them to get a job because of the illegal activity. If law enforcements gets you, you can expect jail time.

So where to start?


 You should know the answer to these questions before you start your hacking career.
  • Which type of hacker do you want to be (white hat, grey hat or black hat)?
  • Which type of hacking do you want to work with (website hacking, system exploits, pentesting etc.)?
  • What is your end-goal?


 You should meet these requirements to become a successful hacker.
  • You shall be patient.
  • You shall dedicate a lot of time to hacking. You will never stop learning, since hacking is a lifestyle.
  • You should have a computer (I expect you to have one since you are reading this).
  • You shall be interested in how the different computer systems works, and how to control them.


 Now that you have an idea of what kind of hacker, you want to be we will look closer into the different topics you can work with as a hacker.

 Website Hacking:


 You properly already guessed it, but website hacking is about hacking websites. You use your skills to find exploits and vulnerabilities in websites and web applications. Almost all major hacking stories in the news are about websites and databases that have been hacked. Once you have enough experience in website security you will be amazed about how easy it is to find vulnerabilities in websites. However, it will take a lot of effort and time to reach that level of skills. You will need to know a large amount of server-side languages and website construction languages like PHP, HTML, JavaScript, SQL, ASP, ASP.NET and Perl. This was just some of the languages you should know about. I will recommend you to take JavaScript, SQL and PHP very serious since it is in those languages you will find the most vulnerabilities.


Pentesting and Forensics:


 Pentesting and forensics can earn you big money. It is these guys the company’s call when they have been hacked. They are exerts in operating systems, wireless connections and exploiting computers. This way will take A LOT of time and effort since there is so much you should know about. You shall know about how the different operating systems works, which exploit there is to them, how to exploit them, routers, encryption, malware etc. the list is almost endless.


Code exploiting:


 Not many people know about this. This will require you to be a complete expert at programming. You shall be at least as good at these programming languages as your main language like English. This kind of hacking is taking a lot of time, and will require you to be patient. Do not get me wrong, every company that releases software like Symantec, Google, Microsoft, Adobe, and Oracle have hackers with these skills employed to check their software for vulnerabilities. Sadly, they cannot find every security hole and therefore some very smart black hat hackers are able to find them, and exploit them before the companies get the vulnerability patched. You should know the most popular languages like C++, Java and C etc.


Computer security:


 The work these people do looks a lot like the pentesters. These people is able to detect and analyze new viruses and malware. They are working for companies like Symantec, KasperSky and Avira etc. Some of them are also working on labs that tests AV’s and new viruses. They are experts in how viruses works and how they infect systems.




 You should now have an idea on where to start and in which direction you want to go. If you found any errors or typos feel free to contact me, and I will look into it. I will be updating this thread recently and add more details. I will soon add a dictionary, which explains the most basic hacking terms. I have putted a lot of effort in this tutorial and my goal with this tutorial is to give computer-interested people an idea of where they should start.

 To the so-called “noobs”, (though I am not a fan of that expression) who reads this:

I hope I have inspired you to begin at hacking. I hope that I have cleared things up a little bit, so it does not seem so messy anymore. If you have any questions or something you did not understand, I would gladly explain it to you again. As one last thing, I would HIGHLY recommend you to become a white hat hacker. Welcome to the hacker’s world, a new world will open up for you and you will never regret that you chose to become a hacker.




 (08-26-2012 07:02 PM)
mrLyosha Wrote: 
I'm glad that you found my post informative and useful.And after some time I remembered one more kind of hackers closely connected to Black Hat Hacking it's a Script Kidding. Some authors put it in different kind, but to be absolutely true Script Kiddies are Black Hats but without good knowledge of hacking, using only automated tools and attacking bad protected targets.
 p.s. I'm just begging learning now basics, so sorry if I'm mistaken, and sorry for possible grammar mistakes in my posts)
 p.s.s Just saw that I have rank: Script kiddie)

 mrLyosha asked for this, and just for any case that anybody is interested in this?

 I have just wrote this down, and i think it will explain your different hacker "ranks".

The Elite Hacker: They know what they are talking about. they are expert in their fields, and they are the top of the food chain. They are writing the programs the Script Kiddies use, and they gain much respect as they know their shit.

The Middle Class Hacker: They know a lot about hacking, and are about to step up to The Elite Hacker. But they do still have a lot to learn. They have a lot of skills, and most or some of them will be able to write their own programs or find the vulnerabilities by themselves.

The Script Kiddie: They are beginners or complete morons. They usually find a SQL injectable site and thinks they the most l33t H4x0r in the world. They use the tools written by The Elite Hacker and have absolutely no idea what they are doing.

 But some Script Kiddies are just learning and are not bragging about how they found a SQL injectable site. They study others work and learn about how they did it. These guys will definitly be better hackers and will gain respect as they are just trying to learn, not to prove that they can find a SQL injectable site.
ENJOY!

Friday, 26 October 2012

How to Send Password Protected Email Messages

 How to Send Password Protected Email Messages

If you have to send  information like credit card numbers, Bank details etc it may not be secure to send it without any encryption and password protection.Hackers can use sniffers to intercept Ur email messages or they can retrieve the data after hacking email accounts.To protect yourself from such situations you can use Lockibin which provides password protection and AES-256 bit encryption to your emails.



  • Click here to go LockBin online service.
  • Fill the form with your desired password.
  • In the text filled write your message. You can also attach a file if you want.

  • After this, click on Submit button.
  • Now your password protected mail will be sent. (Receiver will only get a link to your password protected and encrypted email)
  • When receiver clicks on that link  it will prompt to enter the password otherwise it will not be open.
That’s it! But you have to send password to your friend which can be sent on Mobile number or you can send a normal Email for it.The password protected email is stored in lockbin server itself. Enjoy!

Tuesday, 9 October 2012

HACK HOTMAIL ACCOUNTS: Msn Hacker




I had posted already Gmail Hacker to hack Gmail accounts.With this software we can hack hotmail accounts.
  • Run Hotmail Hacker Builder.exe file on ur pc.
  • Enter your email address  password and subject of email you want to receive
  • Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.
  • Now, send this Hotmail Hacker.exe file to victim of which you want to hack Hotmail password and convince him that this program can hack anyone's Hotmail passwords.
  • Say him to run Hotmail Hacker.exe and enter all information including his Hotmail ID and password and Hotmail ID of victim he want to hack. As he enters this information and hits Login and Start he will receive a error message.
  • You will receive an email in your account containing his password. Hurrah! you will now be able to hack hotmail password.   
Download

Or

Herer

free web site traffic and promotion