Friday, December 23, 2011

How to Find Windows 7 PC Location in Google Map


Geosense is a Windows Sensor that provides the Location and Sensors platform in Windows 7 with accurate and reasonably ubiquitous positioning information without requiring or the assistance of GPS hardware, enabling more practical location-based applications and scenarios on Windows 7.


First Download Geosense Software


After installing the sensor, you need to enable Geosense. Go to your > Windows Start menu, search for > location, and select > Location and Other Sensors from the results listed under > Control Panel.

Saturday, December 17, 2011

How to Hack Password using Cain and Abel

First Download Cain and Abel Software.

Open cain and abel click on cracker option.
How to Hack Password using Cain and Abel
Select LM & NTLM Hashes and click “+” sign

Friday, December 16, 2011

How to Break Windows 7 Password (Easy Way)

Start your computer and enter into Bios Setup. Change your boot preferences to boot from CD /DVD.

Insert your windows Bootable CD and select the “Repair your computer” option from the lower left-hand corner.
%Hacking Tricks %Hacking Tutorial

Thursday, December 15, 2011

Google Hacks (A Compact Utility to several Google Hacks)

Google Hacks allows users to search Google using different Google search hacks. Google Hacks is a compilation of carefully crafted Google searches that expose novel functionality from Google's search and map services.
You can search everything of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches. You can also use this program to use google as a proxy.


Google Hack Result



Wednesday, December 14, 2011

How to use Beast Trojan

Step 1:- Download the necessary software  Beast 2.06

Step 2:- Open the software


Step 3:- Now click on “Build server “button.

Hacking Tools: Password Crackers

Password cracking: the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Another common approach is to say that you have "forgotten" the password and then changing it. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by-file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.


Cain and Abel :- The top password recovery tool for Windows. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

Home:- http://www.oxid.it
Latest Release:- cain & abel v4.9.40
Download:- http://www.oxid.it/cain.html

Hacking Tools: Port Scanners

Hacking Tools (Port Scanners, OS Fingerprinting)

Port Scanner: a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.


Nmap :- This tool developed by Fyodor is one of the best unix and windows based port scanners. This advanced port scanner has a number of useful arguments that gives user a lot of control over the process.

Home:- http://www.insecure.org
Latest Release:- Nmap 5.50
Download:- http://nmap.org/download.html

Saturday, December 10, 2011

Hacking Exposed-5


One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack.
This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials.
There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols.
Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.

  Download  (Size :- 18.5 MB)
                                             

Friday, December 9, 2011

-: The NetBus Trojan :-

NetBus was written in Delphi by Carl-Fredrik Neikter, a Swedish programmer in March 1998.




It is capable of :--
  • Open/Close CD-ROM
  • Show optional BMP/JPG image
  • Swap mouse buttons
  • Start optional application
  • Play a wav file
  • Control mouse
  • Show different kind's of messages
  • Shut down Windows
  • Download/Upload/Delete files
  • Go to an optional URL
  • Send keystrokes and disable keys
  • Listen for and send keystrokes
  • Take a screendump
  • Increase and decrease the sound-volume
  • Record sounds from the microphone
  • Make click sounds every time a key is pressed

Thursday, December 8, 2011

YOUR FIRST STEP TOWARDS HACKING.



hey guys, whats happening?! 
 I am assuming you surf daily, download too much stuff, find cracks & serials & hacking tutorials.  This group is called as anarchists. This is the very beginning step of hacking.
Basic principle behind hacking is learn how the things are constructed, You can easily find the way to destruct it. There are some general mistakes in making things, you can know it only when you try to make it too.
When you make mistake while creating something, if someone try to take over that mistake & use it as a security hole to intrude in your system is called as hacker. So you need to learn the construction. The construction of following things:

Saturday, December 3, 2011

The Hackers Underground Handbook ( for beginners)

Im in a rush, ill be posting some screen shoots later today but anyway here is the book.
Download it and open it with a pdf reader
here is the link to download it
http://www.mediafire.com/?skfudbjlu0lr7vl

Thursday, December 1, 2011

How to Hack passwords using a USB

My first post, its really late so i wont put any pictures in it.
keep reading and you will learn how to RECOVER anny FORGOTTEN passwords


NOTE: You must temporarily disable your Anti-Virus before following these steps. 
What you will need is 
A USB drive
and this 5 tools 






MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassViewRecovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE PassviewIE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.