Sunday, June 27, 2010


Did your parents or some elder brother set a login password to prevent you from using computer or you think they may in future then here is a way to reset windows XP password in five minutes


Thursday, June 24, 2010


Many times the free software or books you download online are rar archives which are password protected.first they fool you and allow you to download the files saying that they are absolutely free but when you try to decompress them they ask you for a password and tell you to visit some site to get the password.this really sucks. you cant do anything but to visit the site or just delete the file in frustration but there is one more option, you can try to crack the password first of all let me tell you there are no such software as rar password remover there are software which can brute force the password but cant remove it is one such password cracker


Saturday, June 19, 2010


1) Please keep your antivirus updated because every passing minute hundreds of new virus and trojans are born and left loose in the cyberspace.

2) Use software like "spyware doctor" to protect you against spying trojans ,cookies etc and keep it updated.

3) If you have downloaded a file or setup and after clicking it, if you notice that it is taking very long time to install or is responding weirdly stop the process right there, if it is not closing use task manager to close it and delete the file permanently, it was probably installing a backdoor in your computer.

4) If some software needs you to disable the antivirus or it is suggested such by the uploader please first check this things
  • is the software popular and made by some reliable company.
  • check if any comments are given at the downloading site always read them to get some hint about the health of the software.
5) If you thing everything is OK then take a chance and download it, if the software requires the antivirus to be disabled don't disable the antivirus right away, first give it a try with antivirus enabled and see what reaction the antivirus gives if the the antivirus gives it a clean cheat then well and good. mostly the antivirus detects a hacking software as a security threat or a trojan if it does so you may take a try with it but if it detects any other thing then trojan like backdoors, virus, worm, adware, then avoid installing it.

But please note there is no guarantee that hacking software detected as security threat or trojan is totally clean but you have to take chances, because no risk no gain.


1) Always check the url of the login page of your account before logging in any site.if the url shows any other address then website you want to log in please dont do it.

2) Never follow any link to any site that is offering you anything free like free laptops, mobile recharge, or any other costly items remember nobody offers anything free to anybody.

3) Use different passwords for different accounts dont use the same password for all the accounts because it is easy to remember, because the first thing any hacker will do after hacking any of your account is try to check if it is the same for your other accounts. better lose one then all.

Friday, June 18, 2010


This is great book on windows XP hacking. From this book you can learn very interesting xp hacks like increasing its speed, customizing it, protecting it better.


Wednesday, June 16, 2010


Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.

Monday, June 14, 2010



There is certainly no shortage of books in this genre- Counter Hack, Hack Attacks Revealed and the best-selling Hacking Exposed (and all of its spin-offs) have covered this information in grueling detail. What sets this book apart is that it does not assume you are already a CISSP or network security guru. Being a "For Dummies" book means that it is written from the assumption that you don't know anything and the information is written in plain English and in terms that even a child could often understand.

DOWNLOAD (torrent link)

Friday, June 11, 2010


PHISHING is a hacking method in which the attacker sends a email or link. clicking on which will take you to a site which looks exactly the same as the site you use like facebook, orkut, gmail etc. where you will be told to provide your information and bingo! you are hacked and the best part is after that you will be redirected to the original website and some common reason like network or server problem will be shown, so you wont even come to know that you were hacked.

here is a tutorial about how you can try phishing and have some fun.

STEP 1) First you must sign for a free webhosting service like
And register your subdomain. After registration you will have a subdomain like (Please select the name of the website wisely and please don't add the name of the website whose phishing page you are making eg. if you are making phishing page of Facebook then pls don't add the word Facebook in the name of the phishing as this website are easily detected and block.)

STEP 2) Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs".

STEP 3) Now DOWNLOAD THIS FILE to your computer and extract the files inside it, you will see folders named facebook, orkut etc. choose which account you want to hack and open the folder, inside the folder you will find two files index.htm and write.php.

STEP 4) Now login to to your Byethost's cpanel (all the details of the byethost account will be there in the confirmation email send by byethost) choose "online file manager" in the cpanel.

STEP 5) (There were many suggestions to make this point more clear so i have divided this 5th step itself into some substeps. hope this will help the readers to understand this step more easily).
  • There are two files in the phisher file downloaded by you, "index.htm" and "write.php. Now right click on "index.htm" and select "edit", the file will open in notepad, press "ctrl + a" to select the whole text and copy it.
  • Now in the cpanel of your byethost account click on "online file manager". In it there is a folder "htdocs" click on it. In it there is a file also called "index.htm", there is a option to edit it, choose the edit option. Now a new window will open, delete all the text in it and paste what you had copied earlier from the "index.htm" in your phisher file. Click on the on the save icon and you are done!.

STEP 6) Now your homepage has become a phisher. open it, you will see that your page has become the login page of the site you want to all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file passes.txt in your "htdocs" folder of your byethost account which contains the username and password of your victim.


Note:- Please use this phishing only on some close friends or relative who will take this sportingly and get aware of the online threats. Using this on somebody whom you don't know will qualify as a crime.


One of the most popular and easy way of hacking passwords, social networking accounts and other information is keylogging.
Keylogging in general refers to keeping a track of the keys pressed on a computer system.
There are two ways to keylogging.
1) Using a physical device which is connected to the computer, which keeps track of the keys pressed on the computer .
2) Using a keylogger software.

The first method is less preferred as the devices are costly and they have to be physically connected to the computers which is hard if you don’t have physical asses to the computer but they have their own merits like they are not detected by firewalls and antivirus software.
But mostly keylogger software are preferred as they are cheap, easy to use and provide many extra features like remote spying , making a quick installing package which is very useful if you don’t have physical asses to the computer. They can work in hidden mode, means they wont show in your added programs list and can only me assessed by pressing some special sequence of keys but they have their own demerits like they are detected by latest firewalls and antivirus softwares .
But there are many keyloggers out there which can bypass the firewalls and fool the antivirus.
Use those keyloggers which come under the category of parenting control or spying software, which are used by parents to keep an eye on their child’s online activities they are antivirus friendly, means they wont be detected by antivirus because if they were detected by antivirus then they wont be of any use as the child will know he is been spied on. Some antivirus, at extreme may just give a warning. But these keyloggers also have some disadvantages like they don’t have features like making remote installation package.


I have noticed, that most people get interested in hacking just to hack their Friend's or enemy's social networking account, so i am writing this tutorial to introduce you to some basic, easy and popular techniques to hack social networking accounts.

lets start with the easier ones

One of the most popular and easy way of hacking passwords and other information is keylogging. Keylogging in general refers to keeping track of the keys pressed on a computer system using software or hardware devices.

for detailed tutorial on keylogging and keyloggers please click here KEYLOGGING to go to my post on keylogging

PHISHING is a hacking method in which the attacker sends a email or link to the target. Clicking on which will take him to a website which looks exactly the same as websites like facebook, myspace, orkut, paypal, ebay etc. where he will be told to provide his information or login details and bingo! he is hacked and the best part is after that he will be redirected to the original website and some common reason like network or server problem will be shown, so he won't even know that he was hacked. Though a bit hard, phishing attack can give excellent results.

for a detailed tutorial on phishing please click here PHISHING to see my post on phishing.

3) HTTP SESSION HIJACKING ( Cookie Stealing)
When you log into a social networking website, they provide you with a 'cookie' which is like your passport while you are logged in. Every time you open a new page in your account, the website checks whether you have the cookie, if you don't, you are not allowed to go further. Http session hijacking is a method used to get hold of  the target's cookie, which can then be used to bypass the log in procedure and directly get entry to the target's social networking accounts.

For tutorial on Http session hijacking please visit my post FIRESHEEP TUTORIAL (Http Session Hijacking)

Thursday, June 10, 2010

lets take sometime understanding the concept of hacking

Hacking refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer.




A white hat hacker breaks security for non-malicious reasons, just for testing their own security system . This type of hacker enjoys learning and working with computer systems, and consequently gains a deeper understanding of the subject.


A grey hatted hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.


A blue hat hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.


A black hat hacker usually the malignanat one, sometimes called "cracker", is someone who breaks computer security without authorization or uses technology (usually a computer, phone system or network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity.

ELITE (or known as 1337 )

Elite is a term used to describe the most advanced and the greatest hackers who are always on "the cutting edge", and a step ahead of everybody else; and one who fully understands the true meaning of what it means to be a hacker. One who is elite finds new security flaws for others to follow, rather than just follow security flaws discovered by others.

Script kiddie

A script kiddie is novice, a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept.

Noob (term for newbie)

A noob is a term used to describe someone who has almost no knowledge of the workings of technology, and hacking; yet sometimes pretend to be experts on the topic or declare themselves as "Hackers" when they have no idea on the topic or the true meaning of what is actually means to be a Hacker. Noobs also lack the discipline it takes to be a true hacker. Noobs are at an even lower level than "Script Kiddies" in Hacker terms.

Saturday, June 5, 2010


Welcome all slaves of the cyberworld.
There is a general opinion that hacking is some mystical thing dangling between quantum physics and wizardry and can only be done when you master all computer and networking related aspects like programming , hardware , etc. but this is not true a child with some knowledge of basic computing can do interesting things with some knowledge of hacking.This blog is dedicated to beginners in hacking who want to impress and gain some respect and admiration by doing some easy hacks.
© 2009 BASIC HACK AND TECH FOR BEGINNERS. All Rights Reserved | Powered by Blogger
Design by psdvibe | Bloggerized By LawnyDesigns