Wednesday, March 23, 2011
Tuesday, March 22, 2011
Monday, March 21, 2011
Sunday, March 6, 2011
Friday, March 4, 2011
How To Hack Gmail Account Password
Learn how to hack Gmail account password using Phishing

How to hack gmail account password:
1. First of all download Gmail Phisher
2. The downloaded file contains:
- gmail.html
- log.txt
- mail.php
4. Once you have uploaded the files in the directory, send this phisher link (gmail.html) to your victim and make him login to his Gmail account using your sent Phisher.
5. Once he logs in to his Gmail account using Phisher, all his typed Gmail id and password is stored in "log.txt".

6. Now, open log.txt to get hacked Gmail id and password as shown.

That's it, very simple. Now you have your victim's Gmail id and password hacked.
How it works ?
When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it . So when the person clicks on try again it redirects to the actual URL so that the victim does not know that yoursite is a fake site and gets his gmail.com password hacked.
Also read:
How To Hack eBay User ID and Password
Learn How to Hack Any Email Password
Learn How to Hack Facebook Password
Do you have questions, comments, or suggestions? Feel free to post a comment!
Rapidshare Time Resetter (unlimited rapidshare) ~ Computer Hacking | Learn How To Hack
Rapidshare Time Resetter (unlimited rapidshare) ~ Computer Hacking | Learn How To Hack
Previously i posted about Top Ways to Search Files on Rapidshare and Megaupload. Here i'll
show you how to download from rapidshare with no limits. Rapidshare Time Resetter can easyly fool RapidShare server and eliminates the "WAITING" for the file, so when rapidshare tells you you have exceeded the limit just run this tool. All you need is dynamic IP address! If you are not sure just try it, only takes a minute.
Note: This tool may not work if you have a static IP, but if your IP address is dynamic it should work perfectly.


http://www.mediafire.com/?gzzd3oydyog
or
http://www.megaupload.com/?d=5NHYPKBH
Also read:
Download Unlimited Rapidshare Files Directly For Free
Do you have questions, comments, or suggestions? Feel free to post a comment!
Rapidshare Time Resetter (unlimited rapidshare)
How to Download Rapidshare files unlimited and free with Rapidshare Time Resetter. Download more than you can without Rapidshare Premium Account!Previously i posted about Top Ways to Search Files on Rapidshare and Megaupload. Here i'll




http://www.mediafire.com/?gzzd3oydyog
or
http://www.megaupload.com/?d=5NHYPKBH
Also read:
Download Unlimited Rapidshare Files Directly For Free
Do you have questions, comments, or suggestions? Feel free to post a comment!
The Best Operating System for Hackers ~ Computer Hacking | Learn How To Hack
The Best Operating System for Hackers ~ Computer Hacking | Learn How To Hack

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.
Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hatters, it is an easy access to software that facilitates exploitations of secure system. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!
Major Features
BackTrack features the latest in security penetration software. The current Linux kernel is patched so that special driver installation is unnecessary for attacks. For example, an Atheros-based wireless networking adapter will no enter monitor mode or inject packets without the MadWiFi driver patch. With BackTrack, you don’t need to worry about that. It’s just plug-and-play ready-to-go!
What’s great is that this Linux distribution comes Live-on-CD. So, no installation is needed. However, what you experience BackTrack, you will realize that it is a must to download this operating system and install it on your Laptop. At the very least, download the VMWare Virtual Appliance for Backtrack. Make sure you also install the VMWare Tools for Linux as well. Many features will still work in VMWare mode.
Tools:
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.
BackTrack includes many well known security tools including:
A large collection of exploits as well as more common place software such as browsers. BackTrack arranges tools into 11 categories:
Download and Documents:
Home Page
User Forums
Documentation
Download Mirrors
Do you have questions, comments, or suggestions? Feel free to post a comment!
The Best Operating System for Hackers
There are a couple of things that are essential to any hacker’s walk of life. To name a few, there’s the ubiquitous flash drive for data transfer. You have the crossover cable for even faster data transfer. There’s the Wi-Fi antenna for high gain and strong amplification. Possibly, you might find a video capture card in the computer. Of course, there’s the ubiquitous laptop and desktop computer. But what software is on these computers? Undoubtedly, you will find at least two operating systems, most often Windows and Linux. But with Linux, there are several different distributions. Is there a specific one? With hackers and crackers, there is only one Linux distro out there. It is called Backtrack.
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.
Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hatters, it is an easy access to software that facilitates exploitations of secure system. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!
Major Features
BackTrack features the latest in security penetration software. The current Linux kernel is patched so that special driver installation is unnecessary for attacks. For example, an Atheros-based wireless networking adapter will no enter monitor mode or inject packets without the MadWiFi driver patch. With BackTrack, you don’t need to worry about that. It’s just plug-and-play ready-to-go!
What’s great is that this Linux distribution comes Live-on-CD. So, no installation is needed. However, what you experience BackTrack, you will realize that it is a must to download this operating system and install it on your Laptop. At the very least, download the VMWare Virtual Appliance for Backtrack. Make sure you also install the VMWare Tools for Linux as well. Many features will still work in VMWare mode.
- Based on: Debian, Ubuntu
- Origin: Switzerland
- Architecture: i386
- Desktop: Fluxbox, KDE
- Category: Forensics, Rescue, Live Medium
- Cost: Free
Tools:
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.
BackTrack includes many well known security tools including:
- Metasploit integration
- RFMON Injection capable wireless drivers
- Kismet
- Nmap
- Ettercap
- Wireshark (formerly known as Ethereal)
- BeEF (Browser Exploitation Framework)
A large collection of exploits as well as more common place software such as browsers. BackTrack arranges tools into 11 categories:
- Information Gathering
- Network Mapping
- Vulnerability Identification
- Web Application Analysis
- Radio Network Analysis (802.11, Bluetooth, Rfid)
- Penetration (Exploit & Social Engineering Toolkit)
- Privilege Escalation
- Maintaining Access
- Digital Forensics
- Reverse Engineering
- Voice Over IP
Download and Documents:
Home Page
User Forums
Documentation
Download Mirrors
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Hack Rapidshare Premium Account Password ~ Computer Hacking | Learn How To Hack
How to Hack Rapidshare Premium Account Password ~ Computer Hacking | Learn How To Hack
Usually I download softwares from Rapidshare and sometimes from MegaUpload. But unfortunately most of these file sharing sites have a premium area and the services from the free area are not good and investing for the premium account for these sites are not really possible for us. So, I am posting this article on rapishare premium hacking to inform you ways to hack Rapidshare premium account.
Hack Rapidshare Premium Account Password:
I will show you 5 methods to hack rapidshare premium account and download/upload as many files as you want from their server.
1. RapidShare Phishing

Now, this is most useful method to hack Rapidshare premium password. The only thing you have to do is simply create a Rapidshare Phisher (fake page) and then send this Rapidshare Phisher to victim and make him to login to his Rapidshare premium account using our sent fake login page. Once he logins to his Rapidshare premium account using our sent phisher, his Login and Password are sent to your email address and you are able to hack Rapidshare premium account password. Here's how to do that:
1. First of all download Rapidshare Phisher here.
2. The downloaded file contains:
4. Once you have uploaded the files in the directory, send this phisher link (index.html) to your victim and make him login to his Rapidshare account using your sent Phisher. You can change the name of index.html however you like.
5. Once he logs in to his RapidShare account using Phisher, all his typed Rapidshare id and password is stored in "login.txt".

6. Now, open login.txt to get hacked Rapidshare id and password as shown.
Very simple. Now you have your victim's Rapidshare id and password hacked.
2. Keylogging
This is one of the most easiest method to hack Rapidshare premium account password. Here, you have software named by which you can record all keystrokes typed on victim computer. These recorded keystrokes are sent to your email inbox. Since, you have typed Rapidshare premium password, you can easily hack Rapidshare premium account. Read more about how to hack Rapidshare premium password using keylogging here.
3. Hacking Primary email address
Every Rapidshare premium account has a primary email address. So, simple logic is to hack Primary email address and then click on "Request Forgotten password" link on Rapidshare login page. Then rapidshare will send password to primary email inbox which is hacked by you. Thus, you've obtained new Rapidshare premium account password and now able to hack Rapidshare premium account. I found a great tutorial how to hack a hotmail account on Hackforums.net.
4. Remote Desktop Spy
Remote Desktop Spy is a powerful computer surveillance program which can be used in the home, school or office to monitor and record every detail of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites visited, files created or changed, and a screenshot logger which can take hundreds of snapshots every hour.

Features:
5. Social Engineering
Well, working of this hacking method depends on your intellegence and convincing power. Here, you have to ask victim about his password or security question of primary email. You have to be cautious while using this method to avoid any doubt of victim. Any clue about security answer can enable you to hack Rapidshare premium account password.
* Rapidshare Time Resetter
This isn't a method to hack a premium account password, but using this trick you can download/upload files UNLIMITED. Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server, a different IP address. Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:
1. Clean up IE or Netscape or Firefox cookie ( In this case the one that belong to rapidshare website)
2. On Command prompt (open MS-DOS) *Click Start ->Run ->In the run box type cmd.exe and click OK.
Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.
Now you should be ready to download/upload as many files as you want from their server.
Another way, get proxies from the internet and apply to the browser.
some of proxies might not work though...
Note:
THIS "cheat" for RAPIDSHARE DOWNLOADS eliminates the "WAITING" for the file. No more COUNTDOWNS. So heres what you do:
1. First, Find a rapidshare download.
2. Hit the FREE BUTTON, like always.
3. While your waiting for it to countdown, change the URL in the bar to:
Code:
and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
or you can simply do the code below ONCE
Code:
* Free premium acount for all
Here is an encrypted message. If you decode that message you get a link to register premium acount on rapidshare, but i dont have a decomipler for PKCS7. Help me decode this message and we have all free premium acounts XD
Code:
So friends, these are some of the popular methods used to hack Rapidshare premium account password. I hope, you'll be able to use these methods to hack Rapidshare premium password.
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Hack Rapidshare Premium Account Password
Learn how to hack Rapidshare premium account password. Rapidshare Tips, Tricks and Hacks.
Hack Rapidshare Premium Account Password:
I will show you 5 methods to hack rapidshare premium account and download/upload as many files as you want from their server.
1. RapidShare Phishing

Now, this is most useful method to hack Rapidshare premium password. The only thing you have to do is simply create a Rapidshare Phisher (fake page) and then send this Rapidshare Phisher to victim and make him to login to his Rapidshare premium account using our sent fake login page. Once he logins to his Rapidshare premium account using our sent phisher, his Login and Password are sent to your email address and you are able to hack Rapidshare premium account password. Here's how to do that:
1. First of all download Rapidshare Phisher here.
2. The downloaded file contains:
- index.html
- login.php
- password.txt
4. Once you have uploaded the files in the directory, send this phisher link (index.html) to your victim and make him login to his Rapidshare account using your sent Phisher. You can change the name of index.html however you like.
5. Once he logs in to his RapidShare account using Phisher, all his typed Rapidshare id and password is stored in "login.txt".

6. Now, open login.txt to get hacked Rapidshare id and password as shown.

2. Keylogging
This is one of the most easiest method to hack Rapidshare premium account password. Here, you have software named by which you can record all keystrokes typed on victim computer. These recorded keystrokes are sent to your email inbox. Since, you have typed Rapidshare premium password, you can easily hack Rapidshare premium account. Read more about how to hack Rapidshare premium password using keylogging here.
3. Hacking Primary email address
Every Rapidshare premium account has a primary email address. So, simple logic is to hack Primary email address and then click on "Request Forgotten password" link on Rapidshare login page. Then rapidshare will send password to primary email inbox which is hacked by you. Thus, you've obtained new Rapidshare premium account password and now able to hack Rapidshare premium account. I found a great tutorial how to hack a hotmail account on Hackforums.net.
4. Remote Desktop Spy
Remote Desktop Spy is a powerful computer surveillance program which can be used in the home, school or office to monitor and record every detail of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites visited, files created or changed, and a screenshot logger which can take hundreds of snapshots every hour.

Features:
- Logs the title, time and duration of every program that is used.
- Records a keystroke log of what the user typed into each program.
- Saves regular screenshot images of the users desktop.
- Records the title and URL of every web page visited.
- View the logs in real-time from another PC.
- Open and close programs, web sites or documents remotely.
- Watch a live image of the users desktop without them knowing.
- Take control of the keyboard and mouse remotely.
- Download and manage files remotely.
- Log off, restart or shutdown the PC remotely.
- Operates in total stealth - no visual windows, icons or processes.
- Runs as a Windows service - impossible for users to disarm.
5. Social Engineering
Well, working of this hacking method depends on your intellegence and convincing power. Here, you have to ask victim about his password or security question of primary email. You have to be cautious while using this method to avoid any doubt of victim. Any clue about security answer can enable you to hack Rapidshare premium account password.
* Rapidshare Time Resetter
This isn't a method to hack a premium account password, but using this trick you can download/upload files UNLIMITED. Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server, a different IP address. Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:
1. Clean up IE or Netscape or Firefox cookie ( In this case the one that belong to rapidshare website)
2. On Command prompt (open MS-DOS) *Click Start ->Run ->In the run box type cmd.exe and click OK.
- type: ipconfig /flushdns and click Enter
- type: ipconfig /release and click Enter
- type: ipconfig /renew -> Enter
- type: exit -> Enter
Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.
Now you should be ready to download/upload as many files as you want from their server.
Another way, get proxies from the internet and apply to the browser.
some of proxies might not work though...
Note:
- If you are on a LAN and behind a router (using NAT, for example)---this will not work.
- If you use a fixed proxy--- this will not work.
- If you have a fixed IP address from your ISP or college or employer or whatever -- this will not work.
- If you happen to get the same IP address from your DHCP server because it's assigned to you -- this will not work
THIS "cheat" for RAPIDSHARE DOWNLOADS eliminates the "WAITING" for the file. No more COUNTDOWNS. So heres what you do:
1. First, Find a rapidshare download.
2. Hit the FREE BUTTON, like always.
3. While your waiting for it to countdown, change the URL in the bar to:
Code:
and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
or you can simply do the code below ONCE
Code:
* Free premium acount for all
Here is an encrypted message. If you decode that message you get a link to register premium acount on rapidshare, but i dont have a decomipler for PKCS7. Help me decode this message and we have all free premium acounts XD
Code:
So friends, these are some of the popular methods used to hack Rapidshare premium account password. I hope, you'll be able to use these methods to hack Rapidshare premium password.
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Hack RapidShare Premium Accounts using RapidShare Hacking Software ~ Computer Hacking | Learn How To Hack
How to Hack RapidShare Premium Accounts using RapidShare Hacking Software ~ Computer Hacking | Learn How To Hack

Rapidshare Plus ACC will automatically check for the working accounts, so all you got to do is get yourself a list of Rapidshare premium account username and passwords. This is best way to get yourself a working account out of huge lists and it can save a lot of time for you too.
Search google or some hacking forums to find great list of rapidshare account names and passwords, and you can start with your job ;)
Using Rapidshare Plus ACC, you can test all the usernames and passwords of Rapidshare and will list the working accounts in a separate window. The accounts can be inputted with a comma or a new line between 2 accounts.
Download RapidShare Plus ACC
Also read:
How to Hack Rapidshare Premium Account Password
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Hack RapidShare Premium Accounts using RapidShare Hacking Software
If you search for free rapidshare premium account & password on google I am sure you will find many websites and blogs offering premium account with passwords. But the problem arises if the premium rapidshare accounts we find so overwhelming and would definitely be very time consuming to manually check them one by one to find any working premium rapidshare account. Of course you prefer to do something else than that! Therefore automatically check for valid premium rapidshare accounts tool is the answer for saving our times and energy. Here’s Rapidshare Plus ACC – Rapidshare Premium Account Checker developed by aline 333.
Rapidshare Plus ACC will automatically check for the working accounts, so all you got to do is get yourself a list of Rapidshare premium account username and passwords. This is best way to get yourself a working account out of huge lists and it can save a lot of time for you too.
Search google or some hacking forums to find great list of rapidshare account names and passwords, and you can start with your job ;)
Using Rapidshare Plus ACC, you can test all the usernames and passwords of Rapidshare and will list the working accounts in a separate window. The accounts can be inputted with a comma or a new line between 2 accounts.
Download RapidShare Plus ACC
Also read:
How to Hack Rapidshare Premium Account Password
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Change Your IP Address and Surf The Web Anonymously ~ Computer Hacking | Learn How To Hack
How to Change Your IP Address and Surf The Web Anonymously ~ Computer Hacking | Learn How To Hack
Previously i've posted "How to find the IP address of the email sender in Yahoo! Mail" and "How to Track the location of an IP address". In this article i'm going to show you a software, Invisible IP Map, that can make you be "anywhere" in world. People that hack sites will need this small baby to help em on the way. This tool will put you in selected location all around the world XD.

Invisible IP Map is user-friendly software that masks your real location. Every computer that is connected to the Internet has its own IP address which could easily be located on a map. This program will help you show yourself like you are surfing from another place on the planet.

Product Information:
This is a Mask IP software which is used to change your real Internet address while browsing. The software will deliver you fresh anonymous proxy servers every time you decide to click on "Get IP Locations". The main benefit of this software is that you can't be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection. By hiding your IP you will prevent receiving spam from marketers which know your interests by tracking your IP when browsing websites. You can use web based e-mail to send anonymous e-mail. Post on bulletin boards without displaying your real IP address.
Main Screens:

Download Invisible IP Map
How To Activate :
1. Replace the original "Options.ini" in the program files folder with the one in the RAR (downloaded one ) and then open the program again. Don't use the details in the ini.

2. After doing that here are the results:

Serial Number for Invisible IP Map:
NAME: SIR_WILLIAMZ
EMAIL: SIRWILLIAMZ@YAHOO.CA
SERIAL: 00822631340408026
This is a very great software and i recommend you to try it. Enjoy :)
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Change Your IP Address and Surf The Web Anonymously
Download Invisible IP Map to surf anonymously in internet. Hide your IP and encrypt your connection.Previously i've posted "How to find the IP address of the email sender in Yahoo! Mail" and "How to Track the location of an IP address". In this article i'm going to show you a software, Invisible IP Map, that can make you be "anywhere" in world. People that hack sites will need this small baby to help em on the way. This tool will put you in selected location all around the world XD.

Invisible IP Map is user-friendly software that masks your real location. Every computer that is connected to the Internet has its own IP address which could easily be located on a map. This program will help you show yourself like you are surfing from another place on the planet.

Product Information:
This is a Mask IP software which is used to change your real Internet address while browsing. The software will deliver you fresh anonymous proxy servers every time you decide to click on "Get IP Locations". The main benefit of this software is that you can't be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection. By hiding your IP you will prevent receiving spam from marketers which know your interests by tracking your IP when browsing websites. You can use web based e-mail to send anonymous e-mail. Post on bulletin boards without displaying your real IP address.
Main Screens:

- Map Menu: This is they key part of the software. Here you can change your IP address, retreive IP locations, get information about your IP location or the location of the other server. In addition, you can recheck the servers.
- IP Information: This screen will give you all the information about your IP and the remote IP. You can see information such as city, region, country, distance between you and the remote server, server type, timeout etc.
- Custom proxy checker: The proxy checker is specially designed for those of you who have own proxy lists. You can add them to the checker and check whether they are working.
- VIP Servers: This is optional add-on for Invisible IP Map software. The VIP servers will give you a high-speed internet access with 128 Bit SSL encryption.
Download Invisible IP Map
How To Activate :
1. Replace the original "Options.ini" in the program files folder with the one in the RAR (downloaded one ) and then open the program again. Don't use the details in the ini.

2. After doing that here are the results:

Serial Number for Invisible IP Map:
NAME: SIR_WILLIAMZ
EMAIL: SIRWILLIAMZ@YAHOO.CA
SERIAL: 00822631340408026
This is a very great software and i recommend you to try it. Enjoy :)
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Hack Someones IP Address ~ Computer Hacking | Learn How To Hack
How to Hack Someones IP Address ~ Computer Hacking | Learn How To Hack
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. Now while most of the tutorials on the net teach you how to steal an ip address via MSN, or any other chat software, in this post I’ll show you how to find IP address of someones computer using script. Using this method for hacking someones ip adress is very easy and effectively, so just follow the steps bellow.
NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk.
How to Hack Someones IP Address?
Alright, I'm gonna give you this script, that you write in the index.php. It will redirect them to http://www.google.com/, but you can change that in the script.
Here is the sript:
Code:
<?php
$file = 'IPz.txt';
$handle = fopen($file,'a');
if(!isset($_GET['p'])) { header('Location: http://google.com'); }
fwrite($handle, $_GET['p'].': '.$_SERVER['REMOTE_ADDR'].'\r\n');
fclose($handle)
?>
1. First of all you need to make a new .txt document on the website you're uploading this to. Call it IPz.txt (You can change that in the script aswell where it says $file = 'IPz.txt'; in the second line. Then change the CHMOD to 777.
2. Now you need to past the script above in to a .php document, and upload it.
3. Now you make people visit your site, and they will get redirected to Google.
4. To view the IP, you simply add "/IPz.txt" after your domain, and you'll see the IP.
This is a very simple, but effectually method for stealing someones IP Address.
Hope you'll find this tutorial useful. Happy Hacking :)
Also read:
How to Change Your IP Address and Surf The Web Anonymously
How to find the IP address of the email sender in Yahoo! Mail
How to Track the location of an IP address
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Hack Someones IP Address
An ultimate hack which enable u to trace any one any where in the world
NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk.
How to Hack Someones IP Address?
Alright, I'm gonna give you this script, that you write in the index.php. It will redirect them to http://www.google.com/, but you can change that in the script.
Here is the sript:
Code:
<?php
$file = 'IPz.txt';
$handle = fopen($file,'a');
if(!isset($_GET['p'])) { header('Location: http://google.com'); }
fwrite($handle, $_GET['p'].': '.$_SERVER['REMOTE_ADDR'].'\r\n');
fclose($handle)
?>
1. First of all you need to make a new .txt document on the website you're uploading this to. Call it IPz.txt (You can change that in the script aswell where it says $file = 'IPz.txt'; in the second line. Then change the CHMOD to 777.
2. Now you need to past the script above in to a .php document, and upload it.
3. Now you make people visit your site, and they will get redirected to Google.
4. To view the IP, you simply add "/IPz.txt" after your domain, and you'll see the IP.
This is a very simple, but effectually method for stealing someones IP Address.
Hope you'll find this tutorial useful. Happy Hacking :)
Also read:
How to Change Your IP Address and Surf The Web Anonymously
How to find the IP address of the email sender in Yahoo! Mail
How to Track the location of an IP address
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Find The IP Address of An Email Sender ~ Computer Hacking | Learn How To Hack
How to Find The IP Address of An Email Sender ~ Computer Hacking | Learn How To Hack
I've been posting a lot about IP Adress Hacks on this blog, like How to Hack Someones IP Adress, How to Change Your IP Adress and Surf The Web Anonymously, etc. In this post i will explain how you can track your friends IP address. You will need to do some social engineering in this trick. You will need to ask your friend to mail you something or send him some mail to which he will reply.
Now there can be two scenarios. Your friends/victims IP can be static or dynamic.
Scenario 1: Static IP
Static IP is assigned by the ISP to a specific user, that is, you have one unique IP whenever you log on to the internet. In this case, here's how you can find the IP. We will consider three major email services, viz. gmail, yahoo and hotmail.
1. Gmail:
Open the mail you have recieved from your friend and click on the down arrow to the right of the reply button. Now click on "Show Original".

You will get to see the complete headers of the mail from which you have to find the IP from which this mail was sent. Mostly in case of a static IP, the IP is shown as in the figure:

2. Hotmail:
Right click on the received mail and select "view message source"

You will get the complete message with source. This is how the originating IP looks in hotmail:

3. Yahoo:
Open the mail and at the right bottom of the mail, click on "Full headers"

Again over here you will get to see the IP in the same format as in hotmail and gmail, shown above.
Scenario 2: Dynamic IP
In case of dynamic IP, hotmail and yahoo wont help much. Whereas Gmail shows the private IP of the sender. Just follow the procedure above as shown for static. On the source page you have to look for the following:

Here the IP 10.141.12.9 is the private IP of our victim. This is how you can get IP information of victims behind subnets. Well sometimes the private is not shown by any of the email services because instead of sending detailed email information a DKIM-signature is sent for authentication.
There are other numerous ways using which we can track our victims IP. Will soon be posting on that. Happy Tracking!!!
Also read:
How to find the IP address of the email sender in Yahoo! Mail
How to Track the location of an IP address
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Find The IP Address of An Email Sender
How to Trace IP Address Location From Email, Gmail, Hotmail, MSN & Yahoo Mail - Email Hacking MethodI've been posting a lot about IP Adress Hacks on this blog, like How to Hack Someones IP Adress, How to Change Your IP Adress and Surf The Web Anonymously, etc. In this post i will explain how you can track your friends IP address. You will need to do some social engineering in this trick. You will need to ask your friend to mail you something or send him some mail to which he will reply.
Now there can be two scenarios. Your friends/victims IP can be static or dynamic.
Scenario 1: Static IP
Static IP is assigned by the ISP to a specific user, that is, you have one unique IP whenever you log on to the internet. In this case, here's how you can find the IP. We will consider three major email services, viz. gmail, yahoo and hotmail.
1. Gmail:
Open the mail you have recieved from your friend and click on the down arrow to the right of the reply button. Now click on "Show Original".
You will get to see the complete headers of the mail from which you have to find the IP from which this mail was sent. Mostly in case of a static IP, the IP is shown as in the figure:
2. Hotmail:
Right click on the received mail and select "view message source"
You will get the complete message with source. This is how the originating IP looks in hotmail:
3. Yahoo:
Open the mail and at the right bottom of the mail, click on "Full headers"
Again over here you will get to see the IP in the same format as in hotmail and gmail, shown above.
Scenario 2: Dynamic IP
In case of dynamic IP, hotmail and yahoo wont help much. Whereas Gmail shows the private IP of the sender. Just follow the procedure above as shown for static. On the source page you have to look for the following:
[Click on the image to enlarge]
Here the IP 10.141.12.9 is the private IP of our victim. This is how you can get IP information of victims behind subnets. Well sometimes the private is not shown by any of the email services because instead of sending detailed email information a DKIM-signature is sent for authentication.
There are other numerous ways using which we can track our victims IP. Will soon be posting on that. Happy Tracking!!!
Also read:
How to find the IP address of the email sender in Yahoo! Mail
How to Track the location of an IP address
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Hack E-Mail Account Password - Email Hacking Software ~ Computer Hacking | Learn How To Hack
How to Hack E-Mail Account Password - Email Hacking Software ~ Computer Hacking | Learn How To Hack
How to Hack E-Mail Account Passwords Using Trojans and Keyloggers
I've been posting a lot about Email Hacking on this blog. Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.
How to Hack Email Account Passwords Using ProRat?
1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".
2. Open up the program. You should see the following:

3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".

4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.

5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.
Here is a quick overview of what they mean and which should be checked:

6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.

7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.

8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.
9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.
Very important: Do not open the "binded_server" file on your system.
10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.
11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.
Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.

12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.

13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.

14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.

15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.
Do you have questions, comments, or suggestions? Feel free to post a comment!
How to Hack E-Mail Account Passwords Using Trojans and Keyloggers
I've been posting a lot about Email Hacking on this blog. Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.
How to Hack Email Account Passwords Using ProRat?
1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".
2. Open up the program. You should see the following:

3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".

4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.

5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.
Here is a quick overview of what they mean and which should be checked:

6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.

7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.

8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

Very important: Do not open the "binded_server" file on your system.
10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.
11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.
Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.

12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.

13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.

14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.

15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.
Do you have questions, comments, or suggestions? Feel free to post a comment!
Hacking Internet Cafe To Get Unlimited Time ~ Computer Hacking | Learn How To Hack
Hacking Internet Cafe To Get Unlimited Time ~ Computer Hacking | Learn How To Hack
I had some troubles with my computer, so it's been a while since my last post on this blog. I spent some time in internet cafe, playing LAN games with my friends. We used to pay only few bucks and then play for hours for free, without getting noticed, using a little trick. You don't need any software or hacking skills to do this trick. It's very simple and anyone with a bit computer knowledge can do it. Lets start.
How to disable the timer on the computers in Internet Cafe and play with your friends as long as you want.
1. First of all create a new Text Document. Then write CMD in it, and then save it as anything.bat. (Make sure you're file is .bat)

2. Now find your batch (.bat) file and run it. If you've done it correctly, you'll see that CMD (Command Prompt) will open.
3. Now, write in the CMD: cd\windows (This will change the directory to WINDOWS). Then type regedit and regedit editor should open.

4. Now navigate to:
5. Then on the right pane where it says Disable Taskmanager, right click on it and scroll down to modify, then change the value of it to 0. Then open Task Manager (CTRL+ALT+DELETE or CTRL+SHIFT+ESCAPE) and disable the Internet Cafe's timer.
If you did this right, you're done. Happy Hacking ;)
Do you have questions, comments, or suggestions? Feel free to post a comment!
Hacking Internet Cafe To Get Unlimited Time
Learn how to get unlimited time in Internet CaféI had some troubles with my computer, so it's been a while since my last post on this blog. I spent some time in internet cafe, playing LAN games with my friends. We used to pay only few bucks and then play for hours for free, without getting noticed, using a little trick. You don't need any software or hacking skills to do this trick. It's very simple and anyone with a bit computer knowledge can do it. Lets start.
How to disable the timer on the computers in Internet Cafe and play with your friends as long as you want.
1. First of all create a new Text Document. Then write CMD in it, and then save it as anything.bat. (Make sure you're file is .bat)

2. Now find your batch (.bat) file and run it. If you've done it correctly, you'll see that CMD (Command Prompt) will open.
3. Now, write in the CMD: cd\windows (This will change the directory to WINDOWS). Then type regedit and regedit editor should open.

4. Now navigate to:
HKEY_CURRENT_USER>AppEvents>Software>Classes>Microsoft>Windows>Current Version>Internet Settings>Policies>System
5. Then on the right pane where it says Disable Taskmanager, right click on it and scroll down to modify, then change the value of it to 0. Then open Task Manager (CTRL+ALT+DELETE or CTRL+SHIFT+ESCAPE) and disable the Internet Cafe's timer.
If you did this right, you're done. Happy Hacking ;)
Do you have questions, comments, or suggestions? Feel free to post a comment!
Subscribe to:
Posts (Atom)