Wednesday, February 18, 2009

Hacking articles

A book who teaches you how to make trojans in Delphi:

http://rapidshare.com/files/173953686/PaperX_-_how_to_code_a_TROJAN.pdf

How to find any song (mp3) using google !

Ok lets see how we can use this to find any song we want..
First lets see in normal terms how google responds to us when we search for this old classic song Hotel California performed by Eagles

As you can see we end up with tons of results as every one of them either asking you to purchase the tracks..so on.. all of us done this before and we clearly know there is no place to get the files downloaded for free

Now lets hack…

Here is the code I’m going to use it in the Google search field

?intitle:index.of? mp3 Song name

SQL Auto-Injector

http://rapidshare.com/files/199194759/Sql_Auto-Injection_2.6.7.rar

Some phishing Page with

---What is a phisher---
Basically a phisher is a fake login page, that is made to look exactly like the real login page of the real website so as to fool somebody into entering their information and sending it to you.

---How can I get somebody to login to my phisher---
That's for you to find out, use your mind. Probably the simplest way is Social Engineering and some phishing skill.

---How to use---
Find a web host that supports php.
Upload all of the files to your web hosting.
Goto the link (yoursite.freehostname.com or whatever) and it should show the login if you uploaded it in the root directory.
To get the passwords they enter goto yoursite.freehostname.com/passwords.txt, or whatever the name of your text file is.

---Changing the log.txt or password.txt to something else---
First rename your text file to what you want it, so nobody can guess it.
Then open the next.php (or may be named out.php)and edit the text that says passes.txt to whatever you named your text file.

---How to hide links in forums---
If your trying to post it where html is allowed its:
http://yourreallink.com

If you are trying to post it on forms its: http://yourreallink.com

Fake Email (Public Edition)

http://rapidshare.com/files/198433810/Fake_Email.rar

Don't ask for e-mail hacks -- Read Why

I'm merely disappointed by the number of technically illiterate people around the world. The most popular question in any hacking related site is "How to hack e-mail" its not tolerated in any security/hacking related forum and if asked you can expect to get a rant from people. the reason is simple because there are NO ways of hacking a e-mail address by easy means and the people who know this fact often get very annoyed when most people don't understand WHY its NOT POSSIBLE !

The hacking of a e-mail is possible when a person who owns the account gets hacked. the other way is to hack them directly from the e-mail servers which is most unlikely because these sites use sophisticated Intrusion Detection and highly skilled consultants who are up to date with exploits and patch's. unless you are a real professional hacker its highly unlikely you will ever break into a e-mail server.

People MUST understand that there are NO PROGRAMS/SOFTWARE'S that can hack a e-mail password when you enter an e-mail address. to understand this better let me explain you how e-mail works

Lets say you have a gmail account

When you enter your username and password and hit login what happens is your outgoing e-mail server encrypts the login information and sends over the network to its destination which is a gmail server which can ONLY decrypt the encrypted credentials then these were checked against its database and if they match it will re direct you to your mail inbox. to authenticate you with the gmail server, it will send you a cookie ( a text file ) with a session ID to your browser confirming that you are authenticated so the gmail server.

So there was a time when e-mail servers gave the option to NOT to use SSL cause it slows down the e-mail. because of the time it takes to encrypt. it was a "happy time" for the hackers who simply used a wifi hotspot to sniff session ID and break into emails !!! why ? because If anyone sniffs your session ID he can use it to login into you mail WITHOUT the password because the session ID is the proof of authentication as I mentioned earlier ^ but with almost all the e-mail servers NOW use a SSL encryption and the Session ID is also encrypted so by sniffing its NOT possible to decrypt the ID !

So there goes Packet Sniffing

You may ask so what ? why the encryption cannot be cracked ?

Because The encryption uses Hypertext Transfer Protocol over Secure Socket Layer and public/Private key encryptions technique which is almost impossible to crack. Do some Research on these terms and you will know why its not possible to crack/

If you're curious and patient enough read this else Skip

Internet Encryption

So now the next possible way is to somehow hack into the gmail servers and pull the password hash's and then crack them. well, sadly not many people have succeeded doing it because its highly impossible and way too risky

Now after reading all this you might have a slight idea why I ask people who claim "they can hack any e-mail" to prove it !! so if you can make a program that can somehow bypass all the security and bring the password from the gmail server then you deserve a noble prize !!!



NOW ASK ME HOW TO HACK A E-MAIL ?

Ok you clearly know its almost impossible but the good news is that its possible to hack a individuals computer or a web server. most people lack of common sense and so many people have NO technical knowledge whatsoever. so by hacking them its possible to steal their passwords.

Because we can't hack the password from the servers but we can hack it from the people who use it..

There are so many ways.. here are some of the methods,

1. Fake Login page - Fake page also known as phishing. This process involves creating a fake login page of a certain e-mail and tweaking the password authentication process so when the user inserts login details it will be sent to the hacker. This is the easiest way to hack when the victim has no technical knowledge.

2. Social Engineering - Humans have certain weaknesses and this process involves exploiting someone's weakness to retrieve a credential such as a password. for an e.g: There are many incidents in the past like once when a hacker phoned a employee of a company (victim) and identified himself as the Technical Engineer of that company and instructed the employee (victim) to follow a set of FAKE system error checking and eventually received his login password from him by simply convincing him to reveal them. its just simple as that/ it does takes lot of confidence and skill.

3. Keylogger - Its an application which runs hidden from a user in the background and logs/records all the keystrokes of a user. when a user types something it will be recorded and saved. when the system goes online the recorded details will be sent to the hacker. which can contain a e-mail login detail. the keyloggers are outdated and most of them are detected by anti-virus programs. but when used in a LAN network or when the hacker has physical access to a system it proves to be effective. so if your girlfriend/boyfriend is cheating on you this is the way to go.. but I still think smart people don't keep "cheating related e-mails in their inbox" he he

The downfall of keyloggers are that not many keyloggers can be deployed remotely and they are often picked by anti-virus programs (which can be avoided by using code obfuscation or packing/crypting, changing Entry point..but its more complex)

Another downfall of keylogger is that most of them don't use any encryption and the data is sent as it is, with a skilled reverse engineer its possible to track down the hacker by breaking the file and analysing the code.

4. Trojans - Programs which are often known as backdoors. these programs are similar to keyloggers but they can execute certain commands sent by the hacker. most Trojans have a built in password stealer which is an application that can steal stored browser passwords. also in addition they have far more sophisticated functions such as webcam capture (YES the hacker can see you when you pick your nose) ability to browse/download/edit your files and folders, audio recording, etc.. different Trojans have different functions. All hacker has to do is create a server and send it to the victim and once the victim opens the file it will drop into the victims system and connect to hackers client. now he can issue commands to his server which is in the victims computer and manipulate it whatever the way he likes.

Trojans are very easy to use and most of them use encryption and security evasion techniques and there are TONS of tutorials all over internet if anyone interested in using them.

I hope I have covered enough information. so next time when you see someone asking "How to hack email" Please point it to this thread. so he/she don't waste his/her time and money.

My advise is if you have a personal issue such as cheating/breaking up I encourage you to sort them by other means. or maybe Go see a doctor. if she dumped you... MOVE ON !

DON'T EVER PAY ANYONE TO HACK ANY EMAIL because ................ I hope you read the whole thing ^

I hope this sheds some light and answers the most asked question of all time. Feel free to add your suggestions/feedback and if you share this article please keep the credits intact. any questions feel free to ask and if you want feel free to write constructive criticism.

Telephone Line Hacking and get free calls


This video will show U how to talk or use in other telephone lines...
so that U can use this techniques to talk to anyone without paying bills......

NOTE:::: kindly use this video to know about the techniques....don't imitate this

http://rapidshare.com/files/168235301/CW_telephonehack.rar

pass : EagleLord@CW

Paypal Database 1.5 Full version Free

Hi, guys i have discovered on youtube the full version cracked of paypal database 1.5 of inferno hackware.
But the rar file is protected by password, is 6 length the password, i have try with rar cracker with bruterforce but the estimate time is 1 month!
If you wanted you can crack the rar and after you can send the password in a new post here, please.

Link: http://rapidshare.com/files/187145222/Paypal_DB_1.5__updated_.rar




Software torrents

Orcad Pro v10.0.8252

http://uploading.com/files/TUIY0VZ9/Orcad_v10_5_SP1_Schematics_(By_Knight_Rider)-(Demonoid.com)_6949383.9.torrent.html

Adobe_Acrobat_Professional_v8_Full_Version_with_Keygen

http://uploading.com/files/AC7K8WQM/Adobe_Acrobat_Professional_v8_Full_Version_with_Keygen-[Demonoid.com]_6949383.9.torrent.html

McAfee.VirusScan.Enterprise.8.7i.Final.Retail+AntiSpyware Mo

http://uploading.com/files/99VOPPYI/+-Demonoid.com-+_McAfee_VirusScan_Enterprise_8_7i_Final_Retail_AntiSpyware_Modul_final_6949383.9.torrent.html

WinZip Pro v12.0.8252

http://mu-nl.co.cc/vault/101808/downloads/WinZip_Pro.html

Norton AntiVirus 2009 Gaming Edition 16.1.0.33

http://mu-nl.co.cc/vault/101808/downloads/NaG.html

Download Accelerator Plus (DAP) Premium v.v8.6.1.4

http://www.megaupload.com/?d=09QU9ZY0

Borland C++Builder 2007 Enterprise

http://rapidshare.com/files/143178626/radstudio.part01.rar
http://rapidshare.com/files/143118187/radstudio.part02.rar
http://rapidshare.com/files/143126304/radstudio.part03.rar
http://rapidshare.com/files/143134702/radstudio.part04.rar
http://rapidshare.com/files/143142804/radstudio.part05.rar
http://rapidshare.com/files/143151000/radstudio.part06.rar
http://rapidshare.com/files/143159317/radstudio.part07.rar
http://rapidshare.com/files/143167349/radstudio.part08.rar
http://rapidshare.com/files/143170768/radstudio.part09.rar

CorelDRAW Graphics Suite X4 - With Serial & Activation

http://www.corel.com/akdlm/6763/downloads/trials/GraphicsSuiteX4/CorelDRAWGraphicsSuiteX4Installer_EN.exe

crack : http://rapidshare.com/files/199024750/CorelDRAW.Graphics.Suite.X4Keymaker_Activation_esoft.in.rar

Free 18 months Watching All Showtimes Network channels

http://www.phpearth.com/showfile-21/jumpetv.rar

Website X5 Designer 5.7.7

WebSite X5 is a completely visual software: it does not require any HTML programming skills and it is the ideal tool for both home users and Web Designers who want to create and publish high quality websites with a professional look and feel.

In comparison with previous versions, WebSite X5 presents new interesting functions for the creation and customization of the site: editing functions for images, 3D buttons creation, intro possibilities, multi-language sites, HTML objects, e-mail sending forms, etc.
If you have a project in mind, a personal or company site, a digital photo album or an interactive presentation, WebSite X5 allows you in only 5 steps to pass from a simple idea to a complete and working website, already published and perfectly visible on the Web.

Step 1 - General Settings
Optimized Code for registration on Search Engines – Insert the requested information, also the Description and the Keywords: WebSite X5 automatically generates the code to allow Search Engines correctly indexing your pages.
Models – Browse the collection of more than 500 graphic models and select the one to apply to your site, with the color you prefer. If you imagine your site with a different look, create your graphics through the customized model and animate it with a Flash Animation.

Step 2 - Map Creation
Design and create the site map – Insert the levels and pages defining the menu and site articulation: you can set until 4 levels to organize an unlimited number of pages. You can modify the map in every moment and use it to move yourself among pages during the site creation phase.

Step 3 - Page Creation
Drag & Drop for multimedia page creation – Create every page through simple drag and drop of available objects: texts and images also with RollOver, Flash Animations, Video and Sound, Slide Show, Formatted Tables, Images Galleries, HTML Code, Data Sending Forms.
Editing Functions for the images – Edit the images rotating them, cutting the view area, correcting the regulations, setting filters and borders without using external graphical programs. WebSite X5 optimizes and converts automatically to JPG all imported images.

Create and share your photo albums – Select your best photos and create a Slide Show setting the graphics and selecting among the 50 different transition effects: share the memory emotion has never been so easy.
Enrich your pages of contents – Take advantage of the possibility of adding your HTML code to set a visitors counter and to show interesting contents to web navigators: news, weather forecast, work and estate offers, etc. WebSite X5 suggests you some free services and it is compatible with the AdSense program of Google.
Create form to send data – As simple as you manage the other objects, create a form to collect the data you want and make them be sent you by e-mail.

Step 4 - Advanced Settings
Create three-dimensional buttons – Customize the menus and create three-dimensional buttons through a proper editor defining also the mouseover effect.
Intro and multi-language sites – Set image, video or Flash Animation you want to view as site Intro, set a soundtrack and the links for language selection.
Reserved Area – Select the protected pages and create a reserved area to access to only with a password.

Step 5 - Site Export
Publish through an internal FTP – Publish the created site on-line directly from WebSite X5: you don't need any external FTP program to transfer all necessary files on the server to make immediately visible the site on the Web.

Download:http://www.maishare.com/rmmfqq38ila4/Website_X5_Designer_5.7.7.rar.html

Windows Vista Ultimate x64 SP1 [Integrated February]

http://rapidshare.com/files/199384835/Microsoft.Windows.Vista.ULTIMATE.x64.SP1.Integrated.February.2009.OEM.DVD-BIE.torrent

Portable Oxford Dictionary 11th Edition

This is the revised version of the CD-ROM for the world-famous Concise Oxford English Dictionary, 11th Edition. It contains over 240,000 words, phrases, and definitions, including all the latest new words. It offers rich vocabulary coverage, with full treatment of World English, rare, historical, and archaic terms, as well as scientific and technical vocabulary, and provides hundreds of helpful notes on grammar and usage.

This CD-ROM offers full-text search functionality, instant look-up from Windows documents, including email and the Web, high-quality spoken pronunciations for thousands of words, and interactive educational word games, making it ideal for family use as well as for homework and school use.

New to this edition is a fascinating “English Uncovered” supplement, revealing findings from the billion-word Oxford English Corpus and the behind-the-scenes dictionary research program. Find out how new words and meanings emerge, which are the most common words, and how the language is changing.
This dictionary also contains full appendices on topics such as alphabets, currencies, electronic English, and the registers of language, from formal to slang, plus a useful Guide to Good English with advice on grammar, punctuation, and spelling.

Download : http://uploadbox.com/files/OR5Org2vw2

PDF Password Remover 3.0 (Portable)

http://rapidshare.com/files/199203094/Portable_PDF_Password_Remover_3.0

Magic Speed v3.4 (2009)


Your PC is slow in boot-up and running? Magic Speed will make your PC faster and more efficient in 5 simple steps. The software package includes startup management, fixing registry errors, Disk clean-up, and memory management. It does not require special PC knowledge! Magic Speed will analyze your applications, which are loaded with your PC boot-up. Are you sure that you really need these applications? When loaded, they occupy PC memory and slow down PC operation. A check-up will also include virus and spyware tests thanks to a new anti-virus engine updated on a daily basis. Registry errors also negatively affect PC efficiency. By deleting temporary files, you will increase free space on your hard drive and speed up its operation. Make use of the unique Boost Windows option - by adding it to the startup you will discover a great improvement to your PC operation!

http://rapidshare.com/files/195963521/Magic_Speed_v3.4.rar

Norton AntiVirus 2009 16.0.0.125

Symantecs Norton AntiVirus 2009 - Winning protection against viruses, spyware, and other malicious threats! Heuristically detects Spyware threats, detects blocks Internet worm attacks, and protects email. Norton AntiVirus blocks viruses and spyware with advanced protection. It helps protect your entire computer by stopping viruses, spyware, and other security risks. Norton AntiVirus works in the background so you can surf the Internet, read the news, play games, and download software or music without disruption...

DOWNLOAD : http://www.easy-share.com/1903683157/Norton_AntiVirus_2009_16.0.0.125_spirkov.rar