tag:blogger.com,1999:blog-20493802249797787612024-03-08T17:04:14.978+05:30BASIC HACK AND TECH FOR BEGINNERSmayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.comBlogger43125tag:blogger.com,1999:blog-2049380224979778761.post-69620289220528227532013-11-21T12:21:00.001+05:302020-07-27T21:49:21.913+05:30Torrent Sites To Download Pirated Movies<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
We all know piracy is a crime and it is the main reason that many of the film financiers are now homeless. You may think that they would not care about the couple of millions lost due to piracy on films that are crossing the billion dollar mark, but if you hear their pleas against piracy, it definitely looks like they won't be able to pay their light bills this month. Anyway here are some popular torrent sites where you can get all the latest movies in normal to blue-ray quality.<br />
<span style="color: blue;"><br /></span>
<a href="http://kickass.to/" target="_blank"><span style="font-size: large;"><span style="color: blue;">Kickass.to</span></span></a><br />
<a href="http://3.bp.blogspot.com/-8WjATW7HfIA/Uo2Z-8HZb6I/AAAAAAAAAZs/a0xgFtVF2uk/s1600/kickass-logo.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="80" src="https://3.bp.blogspot.com/-8WjATW7HfIA/Uo2Z-8HZb6I/AAAAAAAAAZs/a0xgFtVF2uk/s200/kickass-logo.png" width="130" /></a><span style="font-size: large;"><span style="color: blue;"> </span></span>Recently kickass has emerged as the most popular torrent site to download movies. Lately it has been facing some copyright infringement problems but it is going strong, so enjoy it before it faces the some fate as isohunt.<br />
<br />
<br />
<a href="http://1.bp.blogspot.com/-sACu5jFJFc0/Uo2rISvjhtI/AAAAAAAAAaY/qhod4-gCuiw/s1600/yify-logo.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="60" src="https://1.bp.blogspot.com/-sACu5jFJFc0/Uo2rISvjhtI/AAAAAAAAAaY/qhod4-gCuiw/s200/yify-logo.png" width="170" /></a><br />
<a href="http://yify-torrents.com/" target="_blank"><span style="font-size: large;"><span style="color: blue;">Yify-torrent</span></span></a><br />
Most of you will be familiar with the name Yify. Their movie realeases are one of the<span style="font-size: large;"> </span>best. They provide great quality in smaller sizes and also provide the movies in both normal and HD quality. <br />
<br />
<br />
<a href="http://thepiratebay.org/" target="_blank"><span style="color: blue;"><span style="font-size: large;">Piratebay</span></span></a><br />
<a href="http://1.bp.blogspot.com/-hl-UAtvK780/Uo2p_DVJUmI/AAAAAAAAAaM/yNxAyvQ2qEE/s1600/piratebay-logo.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="80" src="https://1.bp.blogspot.com/-hl-UAtvK780/Uo2p_DVJUmI/AAAAAAAAAaM/yNxAyvQ2qEE/s200/piratebay-logo.png" width="80" /></a>And then there is piratebay, the grand old guy. Though now it<br />
provides mostly magnet links its still a great place to search the latest movies.<br />
Note: Recently the domain names of piratebay are being blocked by the respective countries whose top-level domain code piratebay is using. So the best thing to do would be to access piratebay using its IP address 194.71.107.80<br />
<br />
<span id="goog_577666558"></span></div>
mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com33tag:blogger.com,1999:blog-2049380224979778761.post-24727352301496438592012-04-13T19:54:00.000+05:302012-04-13T19:54:04.827+05:30Proxy To Bypass Restrictions On College Network<div dir="ltr" style="text-align: left;" trbidi="on">Seeing the amount of time and bandwidth students waste on social networking sites and torrent downloads. Most of the colleges (at-least in India) have blocked access to such sites on their network. The effectiveness of this restrictive measures depend upon the system used by the college to place this restrictions. Now most of this systems can be easily bypassed by using some simple trick or procedure. But some colleges employ professional system to place the restrictions. Bypassing them can be a real headache. But here is a proxy service which you can use to even bypass this professional systems. Frankly i didn't try it, but one of my friend was facing the restrictions on his college Wi-Fi, especially for torrent downloads. Now he had the options to use other bypassing tricks but it would not work for him because he was compelled to use his student login details to connect to the internet and he feared that if the authorities came across his bypassing he would be permenately blocked from the network. But when he used the below proxy service according to him the proxy bypassed the whole login procedure and directly connected to the internet.<br />
<div><br />
</div><div><b><span class="Apple-style-span" style="font-size: large;">PD-Proxy </span></b></div><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-KJy8CkCLZFU/T4gyeAJ1ZPI/AAAAAAAAAWs/Z8_SmNEXZww/s1600/Pd-Proxy.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://2.bp.blogspot.com/-KJy8CkCLZFU/T4gyeAJ1ZPI/AAAAAAAAAWs/Z8_SmNEXZww/s1600/Pd-Proxy.jpg" /></a></div><div>PD-Proxy is a proxy software which uses tunneling to provide more secure connection to the internet. According to my freind, it uses VPN to bypass the system and connect directly to internet. If you are using Wi-Fi this VPN service can be very useful as the information travelling from your computer to the VPN is encryted and thus you have an added layer of security.</div><div>To use the service, you have to visit their website and sign up. Then download and install the software. Connect through the software and enjoy. Their free account has 100mb limit. Before you buy premium account please check if it works for you, don't come blaming me later, because you can never be sure which service is good to bypass a particular restricting system. </div><div><br />
</div><div><b><span class="Apple-style-span" style="color: blue;"><span style="color: blue;"><a href="http://www.pdproxy.com/" target="_blank"><span style="color: blue;">Click here to visit PD-Proxy website</span></a> </span></span></b><br />
<b><span class="Apple-style-span" style="color: blue;"><span style="color: blue;"><br />
</span></span></b><br />
</div></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com5tag:blogger.com,1999:blog-2049380224979778761.post-77123576374084965812012-04-01T16:05:00.000+05:302013-09-28T00:24:43.517+05:30Ethical Hacking Course Review<div dir="ltr" style="text-align: left;" trbidi="on">
Ethical hacking means to use your hacking skills to try to find weaknesses and security holes in a system, the results of which can be later used to fix those problems and close the security holes which will ultimately lead to a more secure and robust system. Please understand that ethical hacking doesn’t mean your usual social networking hacking and some simple hacking tricks, it is a very broad field, involving many subjects and genres. <br />
Learning ethical hacking can be sometimes time consuming and difficult, as the beginners may get confused and overwhelmed by the amount of information online. Many times the beginners without any proper guidance may try to directly learn advanced things without any prior knowledge of the basics and the fundamentals. I get daily queries about from where to start learning about hacking and which ebooks and sources to refer. I usually don’t answer the queries because ethical hacking is a vast subject and it is difficult to predict in which type of hacking the leaner has interest in. So I would recommend first to understand about the field of ethical hacking and decide whether you are really interested in it. <br />
Now to learn and get basic ideas about ethical hacking, I would suggest you to take same basic ethical hacking course. One such institution providing such course is Innobuzz. If you are an engineering student, I think you may be familiar with the name, they regularly conduct seminars and training programs in colleges. I did not attend one, some of my friends and cousin attended it. Later when I asked about it they said they where happy with innobuzz and that it was a good experience for the beginners who have no or very little idea about what ethical hacking really is. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-CHx4eAxsYvs/T3gvIsnJtNI/AAAAAAAAAWk/7PYGfM1jsa8/s1600/Innobuzz_logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="92" src="http://2.bp.blogspot.com/-CHx4eAxsYvs/T3gvIsnJtNI/AAAAAAAAAWk/7PYGfM1jsa8/s320/Innobuzz_logo.png" width="320" /></a></div>
<span style="font-size: large;"><b>Innobuzz</b></span><br />
Innobuzz is a delhi-based institution which provides training courses in ethical hacking and information security. According to their site they have good industry tie-ups and have strong presence in the information security industry. They offer both physical and distance learning courses. <br />
The distance learning course is a viable option for the beginners who may not be able to attend the physical classes. The distance learning course has no time limit but it is expected from the learner to finish it in roughly one month after which he can give the online certification exam. If you pass it you will be awarded their CISE Level 1 v2.0 (Certified Information Security Expert) certification. The certification is offered by Innobuzz and it can be a very useful certification in your Resume. <br />
The distance learning course requires no prior knowledge of hacking and information security, you just need to have a basic knowledge of computer and networking. Here is some information about the course<br />
<a name='more'></a><br />
<div style="color: #6fa8dc;">
<span style="font-size: large;"><b>Program Highlights</b></span></div>
<ul style="text-align: left;">
<li>The premier certification in Information Security.</li>
<li>Covers both sides of the coin - hacking and security.</li>
<li>Hands on Training Program with over 150 Practicals covered with Live Demonstration.</li>
<li>Covers latest Techniques and Practices in the industry along with CASE STUDIES.</li>
<li>Created by leading security professionals from IIT Delhi and JHU, Maryland.</li>
<li>Assignments and Research Projects given at the end of each Day.</li>
<li>Industry endorsed Training Program, Training methodology and Certification. </li>
</ul>
<br />
<div style="color: #3d85c6;">
<span style="color: #3d85c6; font-size: large;"><b></b></span><span style="font-size: large;"><b>CISE Level 1 v2.0 Training Module</b></span></div>
<ul style="text-align: left;">
<li>Chapter 1 – Introduction</li>
<li>Chapter 2 - Networking & Basics</li>
<li>Chapter 3 - Footprinting</li>
<li>Chapter 4 - Google Hacking</li>
<li>Chapter 5 - Scanning</li>
<li>Chapter 6 - Windows Hacking</li>
<li>Chapter 7 - Linux Hacking</li>
<li>Chapter 8 - Trojans & Backdoors</li>
<li>Chapter 9 - Virus & Worms</li>
<li>Chapter 10 - Proxy Server & Packet Filtering</li>
<li>Chapter 11 - Denial of Service</li>
<li>Chapter 12 - Sniffer</li>
<li>Chapter 13 - Social Engineering</li>
<li>Chapter 14 - Physical Security</li>
<li>Chapter 15 - Steganography</li>
<li>Chapter 16 - Cryptography</li>
<li>Chapter 17 - Wireless Hacking</li>
<li>Chapter 18 - Firewall & Honeypots</li>
<li>Chapter 19 - IDS & IPS</li>
<li>Chapter 20 - Vulnerability Assessment</li>
<li>Chapter 21 - Penetration Testing</li>
<li>Chapter 22 - Session Hijacking</li>
<li>Chapter 23 - Hacking Web Servers</li>
<li>Chapter 24 - SQL Injection</li>
<li>Chapter 25 - Cross Site Scripting</li>
<li>Chapter 26 - Exploit Writing</li>
<li>Chapter 27 - Buffer Overflow</li>
<li>Chapter 28 - Reverse Engineering</li>
<li>Chapter 29 - Email Hacking</li>
<li>Chapter 30 - Incident Handling & Response</li>
<li>Chapter 31 - Bluetooth Hacking</li>
<li>Chapter 32 - Mobile Phone Hacking</li>
</ul>
And please remember this is not some black hat hacking course where you will be only taught to hack social networking accounts and deface websites. This is a course for the beginners and don't expect to become some elite hacker or something. But it will definitely help you to become aware of the latest risks and threat of the information security industry and boost your career.<br />
<span style="font-size: large;"><b><a href="http://www.innobuzz.in/" target="_blank">Click here to visit Innobuzz website</a></b></span></div>
mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com24tag:blogger.com,1999:blog-2049380224979778761.post-53721874872658243012011-07-09T10:02:00.004+05:302015-08-08T15:15:21.954+05:30Pirated movie release formats<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-cCWT3o-uQrI/ThfZydb94nI/AAAAAAAAAQQ/itSVqaBSddA/s1600/Pirated_movies.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="125" src="http://2.bp.blogspot.com/-cCWT3o-uQrI/ThfZydb94nI/AAAAAAAAAQQ/itSVqaBSddA/s200/Pirated_movies.jpg" width="125" /></a></div>
Nobody can deny that they have never seen or downloaded pirated movies, actually without pirated movies life would get a tad bit boring. In recent times the pirated Version of the movies are available on the Internet on the same day of movie release. But before downloading pirated movies always check the release formats. Without the basic knowledge of different pirated movie formats you would be left with a bad copy of the film when other better prints were available for download. So i thought about writing about the popular pirated movie formats. Mostly the information is taken from wikipedia but i have also included my own opinions and experiences of the formats so if you want you can take a look at the wikipedia article. So here are the different formats arranged mostly in the sequence of their releases time.<br />
<a name='more'></a><br />
<b>Type</b>:- CAM <br />
<b>Label</b> :- CAMRip or CAM<br />
Mostly CAM version of the movies appear online on the same day of movie release. CAM copies of the movies are made by recording the movie using a camcorder in the theaters. Due to this, the print quality depends upon the quality of the camcorder. The sound quality too is not that good as it is recorded by the camcorder.<br />
<b>Note</b>:- If you are in a real hurry to watch the movie and the only available version is a CAM, then try to download the movie from good site uploaded by popular warez groups like FXG, aXXo, Devise etc. If downloading from torrent please read the comments, you can get a fairly good idea of the print by reading the comments.<br />
<br />
<b>Type</b>:- Telesync<br />
<b>Labels</b>:- TS or PreDVD<br />
TS versions are CAM versions with a better audio from a secondary source.<br />
PreDVD are rips of pirated DVD sold on the roadside. They too actually are CAM versions, maybe of higher quality. <br />
<b>Note</b>:- If you have waited for a TS and PreDVD copy i would suggest to wait a couple of days more for better quality prints.<br />
<br />
<b>Type</b>:- Pay-Per-View Rip<br />
<b>Label</b>:- PPVRip<br />
These are rips of the moveis from the Pay per view sources .They are good quality prints and with good sound. Recently this prints have become very common.<br />
<br />
<b>Type</b>:- Screener<br />
<b>Label</b> :- DVDScr<br />
These are the rips of the DVD and BR of the movie sent to the reviewers and other peoples for the purpose of reviewing the movie. Mostly the copies have watermarks or messages. Some times some of the film sequences are in Black and White.<br />
<br />
<b>Type</b>:- Region 5<br />
<b>Label</b>:- R5<br />
R5 are rip of the DVD of the movies available in the region 5 which consist of the Indian subcontinent, Africa, North Korea, Russia and Mongolia.<br />
Note:- It is suggested that the audio quality of the R5 prints is not that good because the audio is synced later from some secondary source. But my experience with R5 rips has been good and i was not able to find many difference between the audio, so i would suggest its OK to download R5 rips.<br />
<br />
<b>Type</b>:- HDTV or DS rip<br />
<b>Label</b>:- HDTV, TVrip or DTHrip<br />
This are rips captured from the analog or DTH sources.<br />
<br />
<b>Type</b>:- DVD and Blu-Ray rips<br />
<b>Label</b>:- DVDrip and BDrips<br />
These are the best quality rips as the are ripped from the official DVD and Blu-Rays of the movie.<br />
<b>Note</b>:- In recent times the DVD and Blu-Rays appear online very quickly so if you are not in a great hurry to see the movie, i would suggest to wait for this version of the movie.<br />
<br />
There are some more version but this are the most popular/common ones and i would suggest you to stick with this versions.<br />
<img alt="Advertise with my Blog" border="0" src="http://linkfromblog.com/img.001.008001.gif" height="1" width="1" /></div>
mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com11tag:blogger.com,1999:blog-2049380224979778761.post-61376264650770161052011-05-20T21:46:00.000+05:302011-07-27T19:03:40.099+05:30Hacking Linkedin Passwords using Phishing<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-0WUG9Oc5Nm0/TddEqQK7SmI/AAAAAAAAAOs/zK8w5hZUOwY/s1600/linkedin_logo.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="69" src="http://1.bp.blogspot.com/-0WUG9Oc5Nm0/TddEqQK7SmI/AAAAAAAAAOs/zK8w5hZUOwY/s200/linkedin_logo.jpeg" width="204" /></a></div>Linkedin is one of the most popular social networking site. So here is the phishing file for Linkedin to hack user passwords. <a href="http://www.ziddu.com/download/15065407/Linkedin_phisher.rar.html" target="_blank"><span style="color: blue; font-size: large;"><b>DOWNLOAD</b></span></a><br />
<br />
<span style="color: blue; font-size: large;"><span style="color: black;"><span style="font-size: small;">If you are not familiar with Phishing technique here is a detailed tutorial to carry out a phishing attack.</span></span></span><br />
<div style="color: blue;"><a href="http://hacking-for-beginners.blogspot.com/2010/06/phishing-is-hacking-method-in-which.html"><span style="font-size: small;"><span style="font-size: large;"><b><span style="color: blue;">Go To Phishing Tutorial</span></b></span></span></a></div><b><br />
</b><br />
<b><span style="color: red; font-size: large;">Note</span>:-</b> The phishing site looks exactly the same as the original. If you any suggestion about it please feel free to comment.<b><br />
</b></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com8tag:blogger.com,1999:blog-2049380224979778761.post-74805017092944183522011-04-18T22:40:00.003+05:302011-05-04T20:09:25.882+05:30Cracking PDF User Passwords Or Editing Encrypted PDF ( Tutorial )<div dir="ltr" style="text-align: left;" trbidi="on">PDF has become one of the most popular and widely used file format. Today mostly all the ebooks are available in PDF format. But many times the PDF files are password protected by the creator or the owner. There are two types of password protection for the PDF files. A user password and owner password. The user password doesn't allow the user to open the file without entering the password and the owner password doesn't allow the user to print or edit the PDF file. There are many situation where you may find it necessary to crack this passwords like when you forget the user password to your personal PDF file or you may want to edit the file for what so ever reason or you may just want to crack the password because you can. There is no greater delight in computers then cracking of passwords. Here are methods to crack the both user and owner passwords using a software.<br />
<a name='more'></a><br />
<span style="font-size: large;"><b>Advanced PDF Password Recovery</b></span><br />
<a href="http://3.bp.blogspot.com/-s_tcO5Nw6o4/TaxsP3b1OhI/AAAAAAAAAM8/rzvkN4rl57M/s1600/APDFPR.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="147" src="http://3.bp.blogspot.com/-s_tcO5Nw6o4/TaxsP3b1OhI/AAAAAAAAAM8/rzvkN4rl57M/s200/APDFPR.JPG" width="90" /></a><br />
First you have to download the Advanced PDF Password Recovery software. Here are the links.<br />
<br />
<a href="http://www.ziddu.com/download/14652043/Advanced.PDF.Password.Recovery.v5.0.Pro-DOA.rar.html" target="_blank"><b><span style="color: blue;">DOWNLOAD </span></b></a><br />
<a href="http://thepiratebay.org/torrent/4583101" target="_blank"><b><span style="color: blue;">DOWNLOAD ( Torrent Link )</span></b></a><br />
<br />
<br />
<span style="font-size: large;"><b>CRACKING OWNER PASSWORD</b></span><br />
This password is very easy to crack, the above software cracks it instantly and then you are free to edit or print the PDF document<b>. </b>Here is the method.<br />
<br />
<b>STEP 1) </b>Start the software and open the document to be cracked in it.<br />
<br />
<b>STEP 2) </b>A window will instantly pop out like in the image below<b> </b> <br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://4.bp.blogspot.com/-IIhxH4JyXik/TaxlC5idzOI/AAAAAAAAAMw/CVUv9CIIES0/s1600/O_1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="105" src="http://4.bp.blogspot.com/-IIhxH4JyXik/TaxlC5idzOI/AAAAAAAAAMw/CVUv9CIIES0/s320/O_1.jpg" width="320" /></a></div>Click on "Decrypt now" button.<br />
<br />
<b>STEP 3)</b> The PDF file will be instantly decrypted and it will provide you with the option to save the decrypted document in another location.<br />
<br />
<span style="font-size: large;"><br />
</span><br />
<span style="font-size: large;"><b>CRACKING USER PASSWORD </b></span><br />
This password is very hard to crack and it can be done only using methods like Brute force and dictionary attack. But before you start lets have a look at the hurdles in this method. Now everyone knows that brute force is the method where the software tries every combination of letters to guess the correct password and so it can take very long time to guess lengthy passwords. Now PDF files are mostly encrypted using 128 and 256 bit AES encryption i have provided the benchmark results for brute forcing this passwords.<br />
<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="http://4.bp.blogspot.com/-0xHktw6M6ok/TaxqNWXQJzI/AAAAAAAAAM4/0SJUTzoKGNQ/s1600/Benmrk_pdf.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="200" src="http://4.bp.blogspot.com/-0xHktw6M6ok/TaxqNWXQJzI/AAAAAAAAAM4/0SJUTzoKGNQ/s200/Benmrk_pdf.jpg" width="131" /></a></div><div class="separator" style="clear: both; text-align: center;"></div>(<span style="color: red; font-size: x-small;"> This benchmarks results were taken on a PC with Celeron 2.2 processor, 1 Gb RAM, with no graphics card. Sorry, my other PC has been sent for repair and i had no choice but to take the results on this lower end PC, if you have a core processor or a graphics card it will surely increase your speed, as the software supports GPU acceleration.</span>) <br />
<br />
as you can see the time to crack the password increases exponentially as the length of the password increases.The 256 bit takes less time then 128 and the maximum length of password you may think of cracking is 6. After seeing the above results if you still want to try to crack the password, here is the method<br />
<b><br />
</b><br />
<b>STEP 1)</b> Start the software. The default setting are brute force attack for 4 letters. If you want you can change the setting and select dictionary attack or increase the length of the password to be cracked.<br />
<br />
<b>STEP 2)</b> Now open the PDF file. A window will pop out, select "recover now" option. <br />
<br />
<b>STEP 3)</b> The process will start and when it finds the password, it will notify you.<br />
<br />
<b style="color: red;">Note</b> :- The above software is genuine and there is no legal problems in using it so happy cracking </div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com10tag:blogger.com,1999:blog-2049380224979778761.post-61505115689022533942011-04-07T05:21:00.018+05:302013-11-21T10:35:06.252+05:30SEARCHING PIRATED MOVIES (Beginners Guide)<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
Today one of the main use of the Internet is to see pirated movies. Many of the Internet users get a Internet connection especially for this. For a experienced netizen searching pirated movies is a child's play but the new and inexperienced users have a hard time finding the movies. Now searching for anything pirated is a art and it becomes more perfect after lots of experience. Also every user has his own techniques and tricks. Here i present you with some of the most popular ways of downloading or streaming pirated movies online.<br />
<br />
<span style="font-size: large;"><b>STREAMING</b></span><br />
If you have a fast Internet, streaming the pirated movies is best for you because you can see them right away, no need for completion of the download. Here are the most famous, reliable and fast video streaming websites.<br />
<a name='more'></a><br />
<b>1) </b><a href="http://www.youtube.com/" style="color: blue;" target="_blank"><b>WWW.YOUTUBE.COM</b></a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-M75TfW_yny8/TaI_Eq7UqqI/AAAAAAAAAL4/lb7hLFGmnEY/s1600/Youtube_icon.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="100" src="http://1.bp.blogspot.com/-M75TfW_yny8/TaI_Eq7UqqI/AAAAAAAAAL4/lb7hLFGmnEY/s200/Youtube_icon.jpg" width="100" /></a></div>
YouTube is the most popular video streaming website on the Internet. Mostly all the newly released movies are quickly uploaded on it. You can search for the film using google, just query "film name and youtube".<br />
Here is a useful tip, when you search through google or directly on youtube using just the film's name mostly the search result contains the films trailers or clips from the film. So best thing to do is search "Film's name Part 1" this is because films are mostly uploaded in parts on youtube as it does not allow videos greater then 15 minutes.<br />
<br />
<b>2) <a href="http://www.veoh.com/" style="color: blue;" target="_blank">WWW.VEOH.COM</a></b><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-OEWDYl27wbw/TZ0DSioB8MI/AAAAAAAAALg/Uliiar9JGPw/s1600/Veoh_icon.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="120" src="http://2.bp.blogspot.com/-OEWDYl27wbw/TZ0DSioB8MI/AAAAAAAAALg/Uliiar9JGPw/s200/Veoh_icon.jpg" width="200" /></a></div>
Veoh is another very popular video streaming website. To see the videos you have to download and install their player, from their website. Without the player you can't watch videos on Veoh. You get entire movies in one part here. You will also find rare movies which you normally don't find elsewhere. The streaming is also fast.<br />
<br />
<br />
<b>3) <a href="http://www.dailymotion.com/" style="color: blue;" target="_blank">WWW.DAILYMOTION.COM</a></b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-wvTfRtZc464/TaJA4Q8wA-I/AAAAAAAAAL8/t1UDGY1gIno/s1600/dailymotion_icon.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="100" src="http://3.bp.blogspot.com/-wvTfRtZc464/TaJA4Q8wA-I/AAAAAAAAAL8/t1UDGY1gIno/s200/dailymotion_icon.jpg" width="100" /></a></div>
This is one more site were you will find pirated movies uploaded in parts. Its streaming is also very fast.<br />
<br />
<br />
There are many more video streaming sites like metacafe, megavideos but the above for are more reliable and fast.<br />
<b><span style="font-size: large;"><br />
</span></b><br />
<b><span style="font-size: large;">DOWNLOADING</span></b><br />
If you want to download the pirated movie to see it later, here are some popular methods to download pirated movies.<br />
<br />
<b>1) P2P file sharing (bittorrent and P2P networks)</b><br />
The best way to download pirated movies is using torrent. Mostly all new films are uploaded on torrent in a very short time after release. Mostly the movies uploaded are in HD but you will easily find movies in other formats like divx also. P2P networks like Gnutella are also great source of pirated movies.<br />
If you are new to P2P and don't know how to start with it, my earlier post on P2P file sharing will be helpful here is the link to the post <span style="color: blue;"> </span><b style="color: blue;"><a href="http://cybertronic-devil.blogspot.in/2011/01/introduction-to-to-peer-file-sharing.html" style="color: blue;" target="_blank">Introduction to P2P file sharing.</a> </b><b style="color: blue;"><br />
</b><br />
(always read the comments to get an idea of the films authenticity and quality)<br />
<br />
<b>2) <span style="font-size: small;">File sharing sites</span></b> like Rapidshare, Hotfile, Megaupload, etc are also great source of pirated movies but there is no way to test the authenticity of uploaded movies unlike the torrent where you can get an idea after reading the comments. You can use google to search the films or can directly search on their respective websites but there is a site <span style="font-size: large;"><a href="http://www.filestube.com/" target="_blank"><b style="color: blue;">www.filestube.com</b></a></span> where you can search for the film on this file sharing sites all at once.<br />
<br />
<b>3)</b> If you want to download the movies for seeing the them especially on your smartphone or tablet there are sites where you can download movies which are already converted for viewing on the smartphone's and tablet's small screen here are couple of such sites<br />
<br />
<a href="http://www.fzmovies.net/" target="_blank"><span style="color: blue;"><span style="font-size: large;">www.fzmovies.net</span></span></a><br />
<span style="font-size: large;"><a href="http://www.moviesmobile.net/" target="_blank"><span style="color: blue;"><span style="font-size: large;"><span style="color: blue;">www.moviearena.org</span></span></span></a></span><br />
<span style="font-size: large;"><span style="color: blue;"><span style="font-size: large;"><a href="http://www.moviearena.org/" target="_blank"><span style="color: blue;"></span></a></span><a href="http://www.moviesmobile.net/"><span style="color: blue;">www.moviesmobile.net</span></a></span></span><br />
<br />
<br />
<span style="font-size: large;"><b><b style="color: blue;"><span style="color: black;">SEARCH ENGINES</span></b></b></span><br />
<span style="font-size: large;"><span style="color: blue;"><span style="color: black;"><span style="font-size: small;">There are many search engines dedicated to the task of searching movies. Here are some of them</span></span></span></span><br />
<span style="font-size: large;"><span style="color: blue;"><span style="color: black;"><span style="font-size: small;"> </span></span></span><b><b style="color: blue;"><span style="color: black;"> </span> </b></b></span></div>
<b style="color: blue;"><span style="color: black;">1) </span><span style="font-size: large;"><a href="http://www.vodly.to/" style="color: blue;" target="_blank">www.vodly.to</a></span></b><span style="color: blue;"><span style="font-size: large;"><span style="color: black;"><span style="font-size: small;"> (<b>Former Letmewatchthis.ch / 1channel.ch</b>)</span></span></span></span><br />
<span style="color: blue;"><span style="font-size: large;"><span style="color: black;"><span style="font-size: small;">Let me watch this is one of the most popular site providing links to mostly all the latest movies via different video sharing sites like megavideo, novamov , shockshare, putlocker etc. Not only movies you can also get</span></span></span></span><br />
<span style="color: blue;"><span style="font-size: large;"><span style="color: black;"><span style="font-size: small;">links to popular tv shows, music etc. </span></span></span></span><b style="color: blue;"><span style="font-size: large;"> </span></b><br />
<br />
<b><span style="font-size: large;"><b style="color: blue;"><span style="color: black;"><span style="color: red; font-size: small;">NOTE:- </span></span></b></span></b><span style="font-size: large;"><span style="color: blue;"><span style="color: black;"><span style="font-size: small;">This post will be updated with new ideas in regular intervals so if you like the post don't forget to bookmark the page. Thank You.</span></span></span></span><b><span style="font-size: large;"><b style="color: blue;"><span style="color: black;"><br />
</span></b></span></b>
</div>
mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com5tag:blogger.com,1999:blog-2049380224979778761.post-60724759920481972462011-03-29T20:34:00.001+05:302011-04-11T05:19:36.127+05:30HACKING EMAIL IDs USING SMS & EMAIL BOMBERS<div dir="ltr" style="text-align: left;" trbidi="on">Hacker always come up with innovative ideas to hack email ids. Fake sms and email bomber softwares are one of them. Now let us have a look at how this sms and email bombers are used to hack email ids on a large scale. So what the hacker will do is, make a simple program with Graphical user interface using programing language like Visual Basic or Java (This basic programs are very easy to make if you have some knowledge of Visual Basic).<br />
<a href="http://2.bp.blogspot.com/-ZqaL-G0f-DQ/TZHu-qmKSTI/AAAAAAAAALU/6Nj0NDptlK8/s1600/email_bomber.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="http://2.bp.blogspot.com/-ZqaL-G0f-DQ/TZHu-qmKSTI/AAAAAAAAALU/6Nj0NDptlK8/s200/email_bomber.jpg" width="180" /></a>Here is a example of such a program. The GUI is kept very basic with minimum options. Now when the user fills the fields and presses "bomb" instead of doing its said work it will just deposit the username and the password in the hackers database and give the users some silly error like "Server busy" or "The target has blocked you" etc. So don't be surprised when you receive a email about Viagra or Porn sites because after collecting enough of this email ids the hacker will just sell them to above site owners. <br />
<br />
I am not saying that all this softwares are fake, there are some genuine software which really work. I have my self successfully tested SMS bombers.But they have their limitations. Do you really think that Gmail will allow anybody to bomb anybody? It will quickly understand your intentions and stop you.<br />
<br />
So next time if a thought of bombing comes in your mind. Just pause for a minute and think, do you really want to do this? my personal opinion about bombing is that it is very childish and immature and if anybody gets satisfaction or happiness by doing such dumb things then he should get some psychological help. <br />
<br />
</div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com3tag:blogger.com,1999:blog-2049380224979778761.post-42767316627024372242011-03-19T20:05:00.002+05:302011-05-17T07:03:42.404+05:30FIREFOX HACKING ADDON ( HackBar )<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://lh4.googleusercontent.com/-Xeuy0pyK_QQ/TYS-8YFeEhI/AAAAAAAAALQ/32r4pWAa9Nc/s1600/HackBar.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://lh4.googleusercontent.com/-Xeuy0pyK_QQ/TYS-8YFeEhI/AAAAAAAAALQ/32r4pWAa9Nc/s200/HackBar.jpg" width="200" /></a></div>This toolbar will help you in testing sql injections, XSS holes and site security. It is NOT a tool for executing standard exploits and it will NOT teach you how to hack a site. Its main purpose is to help a developer do security audits on his code. If you know what your doing, this toolbar will help you do it faster. If you want to learn to find security holes, you can also use this toolbar, but you will probably also need a book, a lot of Google and a brain :).Using this addon you wont have to open your notepad every time you need to compose scripts.</div><br />
<b>FEATURES</b><br />
- Even the most complicated urls will be readable<br />
- The focus will stay on the textarea, so after executing the url (Ctrl+Enter) you can just go on typing / testing<br />
- The url in textarea is not affected by redirects.<br />
- On the fly uu/url decoding. <br />
- All functions work on the currently selected text.<br />
- MD5/SHA1/SHA256 hashing<br />
- MySQL/MS SQL Server/Oracle shortcuts<br />
- XSS useful functions<br />
- And lots more !!!<br />
<br />
<a href="https://addons.mozilla.org/en-us/firefox/addon/hackbar/" target="_blank"><span style="color: blue; font-size: large;"><b>DOWNLOAD </b></span></a></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com0tag:blogger.com,1999:blog-2049380224979778761.post-50730103003694112312011-03-15T15:26:00.001+05:302011-05-17T07:04:08.233+05:30HACK YOUR CPU FAN (using speedfan)<div dir="ltr" style="text-align: left;" trbidi="on">One of my PC at home has a Celeron processor. As my other two PCs where having some hardware problem i had to resolve to this Celeron processor. It used to frequently get overheated while playing games and due to the overheating the computer used to turn off automatically, so i started playing around with my CPU fan settings. Here are some tweaks i did,<br />
<b>1)</b><b> First i went to the bios settings and disabled the "smart fan" option.</b>(Smart fan is used to reduce the fan noise, what it actually does is increases the fan's speed only when needed. But it was bad for the Celeron as the max temp limit of Celeron processor is less compared to other Intel Processors, so while the "Smart Fan" increased fan's speed it would be already late and the PC would just turn off. Without "smart fan" the Fan's speed was high enough to keep the Processor from heating up quickly)<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://lh4.googleusercontent.com/-0OKlX1BWBns/TX82nJFAPEI/AAAAAAAAALM/Kkq1WDJrq7E/s1600/SPEEDFAN.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://lh4.googleusercontent.com/-0OKlX1BWBns/TX82nJFAPEI/AAAAAAAAALM/Kkq1WDJrq7E/s200/SPEEDFAN.jpg" width="145" /></a></div><b>2)</b> <b>I still had some problem so i installed a software called "SpeedFan" </b>(SpeedFan is a program that monitors voltages, fan speeds and temperatures in computers with hardware monitor chips. SpeedFan can even access S.M.A.R.T. info and show hard disk temperatures. SpeedFan supports SCSI disks too. SpeedFan can even change the FSB on some hardware (but this should be considered a bonus feature). SpeedFan can access digital temperature sensors and can change fan speeds accordingly, thus reducing noise. SpeedFan can find almost any hardware monitor chip connected to the 2-wire SMBus (System Management Bus (trademark belonging to SMIF, Inc.), a subset of the I2C protocol) and works fine with Windows 9x, ME, NT, 2000, 2003, XP, Vista and Windows 7. It works with Windows 64 bit too. )<br />
<br />
<span style="font-size: large;"><a href="http://www.almico.com/sfdownload.php" target="_blank"><b style="color: blue;">DOWNLOAD SPEEDFAN </b></a></span><br />
<br />
<b>I have no idea why only this piece of software worked, from the many fan control softwares, but it worked for me and now i can play all the games without my PC automatically turning off.</b><br />
<br />
NOTE:- If you too are facing the same type of problem you are welcome to share your problem with us.</div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com0tag:blogger.com,1999:blog-2049380224979778761.post-83823139826232104832011-03-10T18:26:00.004+05:302011-05-17T07:05:02.838+05:30HACKING VKONTAKTE USING PHISHING<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://lh4.googleusercontent.com/-2J6XgpcAxZ0/TXjKaogZ1yI/AAAAAAAAAK4/-gynEpmJSPc/s1600/vkontakte%252Blogo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="48" src="https://lh4.googleusercontent.com/-2J6XgpcAxZ0/TXjKaogZ1yI/AAAAAAAAAK4/-gynEpmJSPc/s200/vkontakte%252Blogo.png" width="200" /></a></div>I had many requests for phishing page of Vkontakte (Russian social networking site), so here is the Phishing file for it <b> <a href="http://www.ziddu.com/download/14130266/Vkontakte_phisher.rar.html" target="_blank"><span style="color: blue; font-size: large;">DOWNLOAD</span></a></b><br />
<br />
For a detailed tutorial on Phishing check out my Phishing tutorial for beginners. <a href="http://hacking-for-beginners.blogspot.com/2010/06/phishing-is-hacking-method-in-which.html" target="_blank"><b style="color: blue;">Click Here to go to Phishing Tutorial.</b></a></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com13tag:blogger.com,1999:blog-2049380224979778761.post-57695530369961884442011-02-10T19:47:00.003+05:302011-02-10T20:32:33.266+05:30ADDING BACKDOOR IN HACKED FACEBOOK ACCOUNTS<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-xAX9oix3JOc/TVP8h3buc_I/AAAAAAAAAKw/ynYWDX204yc/s1600/facebook.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="100" src="http://1.bp.blogspot.com/-xAX9oix3JOc/TVP8h3buc_I/AAAAAAAAAKw/ynYWDX204yc/s200/facebook.png" width="100" /></a></div>Here is a way how some hackers retain the hacked facebook accounts even after the target changes the password or the hacker himself returns it to the target.<br />
Many of the facebook users are unaware that there is a alternative way to log in the facebook account by linking a alternate email account to it. Not the default email id which you use regularly to log in by typing the email id and password but a different email id. So when you are logged in this alternate email id and open the facebook website it directly logs in your facebook account without even asking the password. If you did not get the concept here is a example. Imagine that your regular email id is "regular@gmail.com" and you add a alternate email id "alternate@gmail.com" in account setting. Now when you are logged in "alternate@gmail.com"<br />
and open facebook website it redirects you and directly opens your facebook account. So here the is procedure how you can add this alternate email id as a backdoor.<br />
<br />
<a name='more'></a><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-fzXfC_NNGzo/TVP737eYqfI/AAAAAAAAAKs/Ot7oXEu6FHA/s1600/facebook.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="http://3.bp.blogspot.com/-fzXfC_NNGzo/TVP737eYqfI/AAAAAAAAAKs/Ot7oXEu6FHA/s200/facebook.jpg" width="200" /></a></div><b>STEP 1)</b> Open your facebook account and go to account settings.<br />
<b><br />
</b><br />
<b>STEP 2)</b> In the settings tab you will see a option "Email" click on "change" and add a new contact email which is to be the backdoor.<br />
<b><br />
</b><br />
<b>STEP 3)</b> Now again in the setting tab you will see a option "Linked accounts" click on "change" and add the type of your alternate email id like google, yahoo etc.<br />
<br />
And that's it, your done, now try it. Log of the facebook account, log in the alternate email id and open facebook website and wait, don't stop the loading, after some seconds it will redirect you to the facebook account.<br />
<br />
Note:- The targets who got back their hacked accounts should always check if such backdoor was added to their account, if yes then it should be removed quickly. </div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com24tag:blogger.com,1999:blog-2049380224979778761.post-5330065855856500942011-02-01T12:47:00.011+05:302011-09-25T14:09:24.780+05:30FIRESHEEP TUTORIAL (Http Session Hijacking)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-ZHoTfx1Agns/TaM6RY7AC0I/AAAAAAAAAMU/vXX65keGIbQ/s1600/Firesheep.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="145" src="http://1.bp.blogspot.com/-ZHoTfx1Agns/TaM6RY7AC0I/AAAAAAAAAMU/vXX65keGIbQ/s200/Firesheep.jpg" width="160" /></a></div>Firesheep a Firefox addon has recently become very popular for easily carrying out a HTTP session hijacking attack. Http session hijacking attack can't be considered as a very sophisticated attack but needs some technical knowlegde to be performed . But Firesheep makes the attack a child's play. Firesheep was developed by Eric butler for Firefox, it was released at Toorcon 12 to demonstrate how serious cookie stealing can be.<br />
Now lets understand how Firesheep actually works. When you provide your username and password in login forms of different website and submit it, the browser first encrypts the password and then sends it over the network. The corresponding website compares the information against its internal database and if they match, it sends a cookie(a small text file) to your browser. The browser saves this cookie and uses it to authenticate the user on the website every time the user opens a different page of the website. When the user logs out of his account the browser just deletes the cookie. Now the problem is that this cookies are not encrypted before sending over the network, due to this a hacker can capture this cookies and using them authenticate himself as the user from whom the cookie was stolen.<br />
Now lets see how to use Firesheep.<br />
<a name='more'></a><br />
<br />
<b>Step 1</b>) First download and install WinPcap (WinPcap in Windows is used for capturing network traffic.)<br />
You can use Pcap in libPcap library for unix like systems.<br />
<a href="http://www.winpcap.org/install/default.htm" target="_blank"><b style="color: blue;">DOWNLOAD WinPcap</b></a><br />
<br />
<b>Step 2</b>) Download and open Firesheep in Firefox, it will automatically install it. Or just drag it and place it<br />
over Firefox shortcut (Firesheep at this instant is not supporting Firefox 4 ).<br />
<a href="http://codebutler.github.com/firesheep/" target="_blank"><b style="color: blue;"> DOWNLOAD Firesheep. </b></a><br />
<br />
<b>Step 3</b>) After it is installed, in Firefox go to View -->Sidebar --> Firesheep. A side bar will appear in the<br />
browser with a button "start capturing", press it and sit back. In few seconds you will see account<br />
details with photos of the target. Click on one of it and you will directly enter in his account. Simple<br />
as that.<br />
<span id="goog_442889549"></span><span id="goog_442889550"></span><br />
<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="http://4.bp.blogspot.com/-ftFiDwRFfTg/TaM62RylTFI/AAAAAAAAAMY/Z1uMrIqMw9k/s1600/firesheep%252Btutorial.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-ftFiDwRFfTg/TaM62RylTFI/AAAAAAAAAMY/Z1uMrIqMw9k/s1600/firesheep%252Btutorial.png" /></a></div><b>Note</b>:- Using Firesheep to hijack others account is illegal under wiretapping Act.</div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com29tag:blogger.com,1999:blog-2049380224979778761.post-46487588264860404202011-01-31T20:38:00.011+05:302011-05-17T06:58:42.785+05:30REVEALING PASSWORD HIDDEN BEHIND ASTERISKS<div dir="ltr" style="text-align: left;" trbidi="on"><br />
When you type a password in the password form while logging into any of your account the letters of the password are hidden behind asterisk, so that nobody can have a sneak peak at your password. But many times you may want to know whats behind the asterisks. Here are some methods to reveal the passwords behind asterisks.<br />
<br />
<span style="font-size: large;"><b>1) Using Javascript</b></span><br />
<br />
Using a simple javascript you can reveal all passwords behind the asterisks, here is the procedure.<br />
<b>1)</b>Open the webpage containing the login form with the password behind the asterisks.<br />
<br />
<a name='more'></a> <b>2)</b><code style="color: blue;"> </code><br />
<code style="color: blue;">javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords on this page:\n\n" + s); else alert("No passwords in on this page.");})();</code><br />
<br />
<a href="http://3.bp.blogspot.com/_6U4LPE0hPOw/TVJ6rYheN-I/AAAAAAAAAKo/nux8aD34tMM/s1600/password+reveal.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="124" src="http://3.bp.blogspot.com/_6U4LPE0hPOw/TVJ6rYheN-I/AAAAAAAAAKo/nux8aD34tMM/s200/password+reveal.jpg" width="200" /></a><br />
<code><code><code>Copy the above javascript and paste it in the address bar of the browser and press enter. Instantly a box with the password pops out.</code></code><br />
<br />
<code><code><code>This method works on mostly all the browsers and all the websites like facebook, gmail etc. </code></code></code><br />
<code><code><code><br />
</code></code></code><br />
<code><code><code></code></code></code><code><code></code></code><span style="font-size: large;"><b><br />
</b></span></code><br />
<div style="font-family: inherit;"><span style="font-size: large;"><b><code><code><code>2)Password Viewer</code></code></code></b></span></div><code><code><code><a href="http://4.bp.blogspot.com/_6U4LPE0hPOw/TUbQHqhyERI/AAAAAAAAAKA/PeogyUTqtrc/s1600/p-v.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://4.bp.blogspot.com/_6U4LPE0hPOw/TUbQHqhyERI/AAAAAAAAAKA/PeogyUTqtrc/s1600/p-v.png" /></a><span style="font-size: large;"><span style="font-size: small;">Using password viewer you can take a quick look at the passwords hidden behind asterisks in the password Field. Using it you can also view password in the input field data on a page inside Internet explorer window.</span></span> It is very useful to see password in the instant messaging software like Gtalk and Yahoo messenger. Just click on the hand and place the telescopic pointer on the password field it will instantly reveal the password.</code></code></code><br />
<code><code><code><br />
</code></code></code><br />
<code><code><code><span style="font-size: large;"><a href="http://www.softpedia.com/get/Security/Security-Related/Password-Viewer.shtml" target="_blank"><b style="color: blue;">DOWNLOAD</b></a></span></code></code></code><b><i><strike></strike></i></b> <br />
<blockquote></blockquote></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com15tag:blogger.com,1999:blog-2049380224979778761.post-84688170386425281452011-01-17T22:55:00.001+05:302011-01-17T22:55:53.015+05:30SECURITY REDEFINED (Make your drive unhackable)<a href="http://3.bp.blogspot.com/_ZhgWmyx1qZc/TJEGyXGCThI/AAAAAAAAAIQ/MDtHtd9khfI/s1600/ws1.jpg.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5517198480768126482" src="http://3.bp.blogspot.com/_ZhgWmyx1qZc/TJEGyXGCThI/AAAAAAAAAIQ/MDtHtd9khfI/s320/ws1.jpg.jpg" style="cursor: pointer; float: left; height: 114px; margin: 0pt 10px 10px 0pt; width: 320px;" /></a><br />
<b>Make your drive virtually unhackable by enabling TPM on your machine.</b><br />
<b><br />
</b>We all know how easy it is for snoopers to get their hands on private and confidential data. That’s the main reason we need to constantly refine our security policies to keep confidential data safe. While there are many software applications that will do the job they could be easy to crack; at least for a seasoned hacker. That’s not the only reason to be worried. Imagine losing your laptop or even your portable drive which contains important data.<br />
<br />
<br />
What we are referring to is hardware based encryption rather than the more common software based methods. To begin with you will need a PC with a motherboard that has an embedded TPM (Trusted Platform Module) chip. So before we even get into the intricacies of setting up the encryption system, let’s go a little further and understand the basic functionality of a TPM based motherboard.<br />
<br />
<a name='more'></a><br />
In very simple terms, a TPM chip basically generates random encryption keys where half of the key is stored within the chip and is encrypted/decrypted using an incredibly strong 2048-bit RSA algorithm. This essentially makes it impossible to recover data from the encrypted drive, making it unique to the machine that was used for encryption. In other words, the contents of a protected drive are unreadable when connected to another machine or read by any unauthorized person.<br />
<br />
Before we start, make sure that your motherboard or laptop has the Trusted Platform Module chip. Refer to the manual to confirm this. If it does you will need to make sure it is enabled in the BIOS. Before we progress further make doubly sure that you have not already encrypted any files using this method. If the user information is ever cleared, encrypted files will become inaccessible. Please do back up any protected files first! We also suggest backing up important data before proceeding.<br />
<br />
Start your machine and press the [Delete] key to get access to the BIOS. For laptops it should either be the [F12] or the [F8] key. Search for the term “Security Chip Configuration” or a similar title and press [Enter]. Now select “Enabled” for the Security Chip and move to “Clear Security Chip”. Once the user information has been cleared save changes to the BIOS by pressing [F10], and restart.<br />
<br />
Once you have logged into Windows install the TPM driver (check your motherboard CD/DVD) and restart again. This workshop uses a Gigabyte board that had an Infineon TPM chip. If you have a different chip note that the steps will be a little different, so excercise caution and check all options first.<br />
<br />
<br />
Activating the TPM chip<br />
<br />
Step 1: Bring up the “Infineon Platform Security wizard” by double clicking on the TPM icon. Click “Next” and select “Security Platform Initialization”. On proceeding you will need to feed in a password to initialize the process. Consider this to be your master password as you will need it whenever you want to make global changes.<br />
<br />
Step 2: The Features menu allows you to choose three basic options such as “Automatic Backups”, “Password reset” and “BitLocker Drive Encryption”. We suggest you use the “Automatic backup” and “Password reset” features. Click on “Next” and choose your backup location. You can also reschedule your backup if the default time is not convenient. Clicking on Next will take you to the “Password Reset” menu. Make sure “Create a new Token” is selected and choose a file location. Here it is advisable to save the token to a portable drive rather than the hard drive. Enter the password and click on “Next”. The wizard should now be ready to start initializing the TPM chip. Run an automatic backup once the wizard has initialized the chip.<br />
<br />
<br />
User Initialization Wizard<br />
<br />
Step 3: Double clicking the TPM icon will now bring up the User Initialization Wizard; choose “Next”. You will be asked to feed in your “Basic User Key”. This allows you to make user specific changes. On proceeding you will again be asked to create a Basic User Password reset key. We again recommend saving it to a pen drive. Confirm the setting and click on Next to initialize the setting for the user.<br />
<br />
<br />
Step 4: The next couple of steps will allow you to enable and disable features such as “Encrypting File System” and “Personal Secure Drive”. On the Security Platform Features menu uncheck the “Secure e-mail” while keeping EFS and PSD checked before proceeding.<br />
<br />
<br />
Step 5: To create an encryption certificate click on “Select” and choose “Create”. Select the created certificate and hit “Select”. You should now be able to view the certificate that was chosen. The next step allows you to create your own secure hidden drive.<br />
<br />
<br />
Step 6: Map your drive to any one of the alphabets in the dropdown menu and give your new hidden drive a name. Leave the “Load my Personal Secure Drive at logon” option unchecked and click on “Next”. Decide on the amount of storage space that you want to assign to the secure drive. Now choose an existing drive where this virtual drive will actually reside. Make sure that the drive that’s chosen has enough free space to allocate. Click on Next and enter your basic user password following which the wizard starts configuring the features selected. Click Finish and you are all set to secure your files and folders.<br />
<br />
<br />
You can load and unload your protected drive by simply right clicking on the TPM icon and navigating to “Personal Secure Drive | Load/Unload”. You can choose to either copy or send files and folders to your secure drive by simply right clicking and selecting the appropriate option.<br />
<br />
<br />
Bitlocker Drive Encryption<br />
<br />
For people who don’t own a TPM based motherboard or laptop there is yet another way of securing your valuable data. Windows itself comes with a utility known as BitLocker Drive Encryption. This feature can only be found in the Ultimate and Enterprise versions of Windows Vista, Windows 7 and Windows Server 2008 (Windows 7 comes with Bitlocker To Go for portable drives as well). This feature was designed to make use of a Trusted Platform Module (TPM) chip, but there is a way to work around this if you don't have one.<br />
<br />
<br />
Follow the instructions carefully and back up your system before proceeding. Keep in mind that the Bitlocker Drive Encryption is designed to encrypt an entire partition or volume. Also the time taken to encrypt the entire drive depends on the overall size.<br />
<br />
<br />
Step 1: Open the start menu and type “Group Policy” in the search box. Now in the Local Computer Policy window navigate to “Computer Configuration | Administrative Templates | Windows Components | BitLocker Drive Encryption | Operating System Drives”. Right click on “Require additional authentication at startup” and click “Edit”.<br />
<br />
<br />
Step 2: On the opened page select “Enabled” under “Require additional authentication at startup” and under options check “Allow BitLocker without a compatible TPM”. Once checked other options will automatically change; ignore the automated changes. After you have enabled it to start without a compatible TPM chip, click on Apply and exit the Group Policy editor. The above process basically enables BitLocker but without its full range of effectiveness.<br />
<br />
<br />
Step 3: To enable BitLocker you will need to search for a file named “BitLocker”. Open the Windows Vista or Windows 7 start menu and type “BitLocker” in the search bar. Run the program “BitLocker Drive Encryption”. You should now be able to view all drives currently connected to your system. Select the drive that you want to encrypt and click “Turn on BitLocker”.<br />
<br />
<br />
Step 4: Now select “Use a password to unlock the device” and type in your password. Further on you will be asked to “Save the recovery key to a file”. Save the file either to the hard disk or a portable pen drive to proceed. The recovery key is now your only option to able to access your device in case you forget the password. Once you are done click “Start Encrypting”.<br />
<br />
<br />
Note: Do not save your recovery key on the same drive that is being encrypted else you will not be able to unlock the device in case you forget the password!mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com5tag:blogger.com,1999:blog-2049380224979778761.post-64376415546434066412011-01-11T17:59:00.023+05:302014-08-20T08:58:34.447+05:30HACK FACEBOOK PASSWORD USING EASY METHODS<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://3.bp.blogspot.com/_6U4LPE0hPOw/TSw0XxUIPHI/AAAAAAAAAH0/Js6cLrynjbA/s1600/images.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://3.bp.blogspot.com/_6U4LPE0hPOw/TSw0XxUIPHI/AAAAAAAAAH0/Js6cLrynjbA/s200/images.jpeg" height="75" width="200" /></a>Facebook is the latest teenage craze all around the world. I have seen many people wasting hours for finding different methods and ways for hacking their friend's or enemy's facebook account. Most of the sites claiming to teach easy facebook hacking methods are spam and try to sell you useless hacking ebooks or other senseless softwares.Some even claim to hack the facebook passwords for free for you. Wake up people and think logically. First let me make something clear to you, there is no such software or tool which will hack the Facebook account password for you, while you sit back and enjoy your cappuccino and don't even think of hacking into the facebook databases to get the passwords. But hacking facebook accounts is not completely impossible, i would say it can be done rather very easily if you decide to give your time and have some patience. There may be hundreds of ways to hack facebook account password, but here i am providing you some, which i am familiar with. This is a long post and i have tried to provide all the methods in great detail so bear with me.Now let us begin.<br />
<br />
<br />
<span style="font-size: large;"><b>1) KEYLOGGING</b></span><br />
<br />
<u>Type</u>:- software and hardware<br />
<u>Tools needed</u>:- Keylogger software or keylogger device <br />
<u>Special skills needed</u>:- no special skills needed but some commonsense , some prior knowledge of the target and convincing power.<br />
<u>Main enemy</u>:- Antivirus software and Firewalls.<br />
<br />
<a name='more'></a>Keylogging is one of the easiest and most widely used hacking method for hacking Facebook passwords. The word keylogging means to keep a track / log of the keys pressed on the computer.There are mainly two ways of keylogging, Software and hardware.<br />
<br />
<a href="http://2.bp.blogspot.com/-jRpQAoFdLSs/TaMsl79jOTI/AAAAAAAAAMA/H7sAWLKntRw/s1600/Keylogger.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://2.bp.blogspot.com/-jRpQAoFdLSs/TaMsl79jOTI/AAAAAAAAAMA/H7sAWLKntRw/s200/Keylogger.jpg" height="90" width="120" /></a><b>1</b>) <b>Hardware</b>:- Special computer devices for keylogging are available. They are connected to the keyboard wire and then to the CPU. It looks like the keyboard wire's part and cant be easily detected.When needed the device can be disconnected and the logs can be viewed.<br />
*Bad points:- This method is mostly not preferred for hacking facebook passwords, as the devices are costly and need physical access to the computer.<br />
<br />
<b>2</b>) <b>Software</b> :- There are thousands of different keylogger software which provide the user with a wide range of options.From them the keylogger which can be remotely installed is preferred for hacking Facebook passwords.They keep log of the keys pressed on the target's computer while remaining hidden and after some specific time send it as a email to the user without the target's knowledge..<br />
*Bad points :-Most of the keyloggers are detected by the Antivirus and Firewall softwares, but some keyloggers are able to bypass the Antivirus and Firewall software. You also have to convince the target to install the keylogger while remote installing it.<br />
<br />
<b><span style="color: red;">Personal Tip</span></b>:- Try the keyloggers which come under the parental control category which are used by parents to keep an eye on the child's online activities. This keylogger are mostly Antivirus and Firewall friendly. The AV and firewall wont detect them because if they did detect it then the child will come to know about it and it will be of no use. The only short coming of these keylogger is that they dont have remote installation feature.<br />
<br />
<br />
<span style="font-size: large;"><b>2) PHISHING</b></span><br />
<a href="http://4.bp.blogspot.com/-HUIyzb5O5yQ/TaMtw24JCnI/AAAAAAAAAME/Ng2-yBy6E2k/s1600/Phishing.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://4.bp.blogspot.com/-HUIyzb5O5yQ/TaMtw24JCnI/AAAAAAAAAME/Ng2-yBy6E2k/s200/Phishing.jpg" height="180" width="200" /></a><br />
<u>Special skills needed</u>:- no special skills needed but some convincing power.<br />
<u>Many enemy</u>:- Intelligent targets.<br />
<br />
Phishing is the most widely used hacking method for hacking Facebook passwords. In phishing the attacker sends the target a link. When the target clicks on the link, it takes the target to a fake website which looks same as the real Facebook login page. The attacker convinces the target to log in through that page. When the target types his password and clicks the log in button, the password is instead send to attacker and the target is again redirected to the real website.<br />
<br />
Here is a tutorial about phishing.<br />
<br />
<b>S</b><b>tep 1</b>) First you must sign for a free webhosting service like <a href="http://www.byethost.com/" target="_blank"><b style="color: blue;">www.byethost.com</b></a><br />
And register your subdomain.<br />
after signing you will have a subdomain like www.yourname.byethost.com<br />
<br />
<b>Step 2</b>) Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs".<br />
<br />
<b>Step 3</b>) Now <b><a href="http://www.ziddu.com/download/17629539/FBPHIHER.rar.html" style="color: blue;" target="_blank"><span style="text-decoration: underline;">DOWNLOAD THIS FILE</span></a></b> (<a href="http://wikisend.com/download/443272/FBPHIHER.rar" target="_blank"><b style="color: blue;">Alternate link</b></a>)to your computer add extract the file. Inside the folder you will find two files index.htm and write.php.<br />
<br />
<b>Step 4</b>) Now replace the index.htm file in the "htdocs" of the "online file manager" with the file index.htm of the phisher folder in your computer and also upload write.php file in "htdocs" thats it! you are done.<br />
<br />
<b>Step 5</b>) Now your homepage www.yourname.byethost.com has become a phisher. open it, you will see that your page www.yourname.byethost.com has become the login page of the site you want to hack.now all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file password.html in your "htdocs" folder of your phpnet.us account which contains the username and password of your victim. <br />
<br />
<b><span style="color: red;">Personal Note</span></b>:- The attacker must have a very good convincing power to hack the facebook password with this method. Please try this method carefully as now it is widely known and the target may soon guess the attacker's intentions. The target may report the fake site and you may get in trouble. <br />
<br />
<br />
<span style="font-size: large;"><b>3) HTTP SESSION HIJACKING (Cookie Stealing)</b></span><br />
<br />
<u>Tools needed</u>:- FIRESHEEP software and a laptop, as this is a wireless Internet vulnerability.<br />
<u>Special skills needed</u>:- No special skills is needed.<br />
<u>Main enemy</u> :- Blacksheep <br />
<br />
This method is a bit less known but in recent months it has become widely popular due to the introduction of the software 'FIRESHEEP'. <span style="font-family: inherit; font-size: small;">When you log in to your account at a website, your web browser sends your username and password to the website server. The password is first encrypted and then send over the network. Then the server checks the username and password against the database and if they both match then sends to the user's browser a "cookie" (a text which the browser uses for further requests to the web server) but unlike the password the cookies are not encrypted and are sent as it is over the network, this cookies can be easily captured as they travel through the network or a busy WI-FI. The newly released Firefox extension "FIRESHEEP" makes it more easy. Actually so easy that even a total nube can capture this cookies. For a detailed tutorial on Firesheep <span style="font-size: large;"><a href="http://hacking-for-beginners.blogspot.com/2011/01/firesheep-tutorial-http-session.html" target="_blank"><b><span style="color: blue;">CLICK HERE</span></b></a></span></span><br />
<br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><b><span style="color: red;">PERSONAL NOTE:- </span></b><span style="color: red;"><span style="color: black;">The addon Firesheep had become very popular recently so software Blacksheep was developed which stops Firesheep.</span></span> </span></span><br />
<br />
<br />
<br />
<span style="font-size: large;"><b><span style="font-family: inherit;"><span style="color: black;">4) SOCIAL ENGINEERING</span></span></b></span><br />
<span style="font-size: large;"><b><span style="font-family: inherit;"><span style="color: blue;"><span style="color: black;"> </span></span></span></b></span><br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;"><u>Type</u> :-Psychological</span></span></span><br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;"><u>Special skills</u> :- Patience and Confidence.</span></span></span><br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;"><u>Main enemy</u>:- intelligent target.</span></span></span><br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;"><br />
</span></span></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-62cFoiQhDR0/TaMuzdATFUI/AAAAAAAAAMI/F-C7cJIk7ss/s1600/social_engineering.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://3.bp.blogspot.com/-62cFoiQhDR0/TaMuzdATFUI/AAAAAAAAAMI/F-C7cJIk7ss/s200/social_engineering.jpg" height="220" width="170" /></a></div>
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;">This is not a sure way of hacking facebook passwords but given the time and Patience can yield pretty interesting results.Social engineering attack means to gather information from the target or by using the prior knowledge of the target and then use it to hack the target's facebook password by guessing the password or resetting the password. Gather basic information about the target like </span></span></span><br />
<ul>
<li><span style="font-family: inherit; font-size: small;"><span style="color: black;">Birth date</span></span></li>
<li>Mobile number</li>
<li>The skill he is good at.</li>
<li>favourite historical personality etc</li>
</ul>
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;">and from this information try to guess the target password you will be surprised to see how many people have such guessable passwords.</span></span></span><br />
<br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;"><b><span style="color: red;">Personal Note</span></b>:- Though this is a effective method don't waste too much time in it as there are other aspects of social engineering which i am know presenting in front of you try them.</span></span></span><br />
<br />
<b><span style="font-family: inherit; font-size: large;"><span style="color: blue;"><span style="color: black;">FORGOT PASSWORD HACK</span></span></span></b><br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;"><u>Type</u>:- it is a type of social engineering.</span></span></span><br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;"><u>Special skills needed</u>:- Logic.</span></span></span><br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;"><u>Main enemy</u> :- Intelligent targets.</span></span></span><br />
<br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;">Every social networking site has a password retrieval system to help the user in case he or she forget their password. Facebook also has a password retrieval system which can be wisely used to hack facebook accounts.</span></span></span><br />
<br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;">I had written a post on how you can use the information from facebook to hack the targets account.</span></span></span><br />
<span style="font-family: inherit; font-size: small;"><span style="color: blue;"><span style="color: black;">Click here to read the post </span></span></span><br />
<h3 class="post-title entry-title" style="color: blue;">
<a href="http://hacking-for-beginners.blogspot.com/2010/11/hacking-gmail-and-facebook-accounts.html" target="_blank"><span style="color: blue;">HACKING GMAIL AND FACEBOOK ACCOUNTS USING INFORMATION FROM FACEBOOK</span></a></h3>
<h3 class="post-title entry-title" style="color: blue;">
<span style="color: black;"><b> </b></span></h3>
<h3 class="post-title entry-title" style="color: blue;">
<span style="color: black;"><b>5) Revealing Saved passwords in Firefox.</b></span></h3>
</div>
If you have access to the victims computer. You can check whether the passwords are saved in his browser. For more information read my post on it. <a href="http://cybertronic-devil.blogspot.com/2011/07/revealing-saved-passwords-in-firefox.html" target="_blank"><b style="color: blue;">CLICK HERE TO READ</b></a>.<br />
<br />
<b style="color: red;">NOTE</b>:- If any of the above procedure or link is not working properly, please report. I would be very grateful. Thank you. </div>
mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com599tag:blogger.com,1999:blog-2049380224979778761.post-79674474090189747822010-11-17T00:57:00.001+05:302011-05-17T06:44:56.577+05:30HTTP SESSION HIJACKING (Cookie Stealing)<div dir="ltr" style="text-align: left;" trbidi="on">When you log in to your account at a website, your web browser sends your username and password to the website server. The password is first encrypted and then send over the network. Then the server checks the username and password against the database and if they both match then sends to the user's browser a "cookie" (a text which the browser uses for further requests to the web server) but unlike the password the cookies are not encrypted and are sent as it is over the network, this cookies can be easily captured as they travel through the network or a busy WI-FI. The newly released Firefox extension "FIRESHEEP" makes it more easy. Actually so easy that even a total nube can capture this cookies.<br />
for more information and to download firesheep visit here <a href="http://codebutler.com/firesheep" target="_blank"><b><span style="color: blue;">FIRESHEEP</span></b></a></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com0tag:blogger.com,1999:blog-2049380224979778761.post-68883516064103304642010-11-16T01:46:00.000+05:302011-01-20T12:50:54.542+05:30HACKING GMAIL AND FACEBOOK ACCOUNTS USING GMAIL SECURITY QUESTION<a href="http://4.bp.blogspot.com/_6U4LPE0hPOw/TOGUvWfxBfI/AAAAAAAAAHE/NVtC1gsYRpM/s1600/Untitled.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="http://4.bp.blogspot.com/_6U4LPE0hPOw/TOGUvWfxBfI/AAAAAAAAAHE/NVtC1gsYRpM/s200/Untitled.png" width="200" /></a><style type="text/css">
<!--
@page { size: 8.5in 11in; margin: 0.79in }
P { margin-bottom: 0.08in }
-->
</style> <br />
<div style="margin-bottom: 0in;">I like to check the password retrieval option of different sites and when i was checking out Gmail's option i found and interesting thing. Its not something ingenious or new thing but thought of sharing the observation with everybody so please forgive me if it seemed to you a time waste.</div><div style="margin-bottom: 0in;">So first lets take a look at the Gmail's password retrieval option.</div><div style="margin-bottom: 0in;">So when you click on the 'forgot password' option and provide the email id, in Gmail it gives you three password reseting options. <br />
<a name='more'></a></div><ol><li><div style="margin-bottom: 0in;">it sends the password reseting link to your alternate email id, which you had provided during the account creation.</div></li>
<li><div style="margin-bottom: 0in;">It sends a random password reseting code to your mobile through sms which you have provided during account creation.</div></li>
<li><div style="margin-bottom: 0in;">It asks the security question whose answer you have provided during the account creation </div><div style="margin-bottom: 0in;">(it asks the security question only if the account has been not logged on for the last 24 hours.)</div></li>
</ol><div align="LEFT" style="margin-bottom: 0in;"><br />
</div><div align="LEFT" style="margin-bottom: 0in;">now the first two option are of no help unless you have hacked the alternate email id or somehow you have in you possession the the users mobile. Mostly all major sites asks two security questions but Gmail asks only one (only if the account has not been logged into for the last 24 hours) now random questions are sometime hard to guess but here again Gmail makes the mistake, to see it we will have to go back in time when the account is actually being created. While creating a Gmail ID it asks you to choose a security question , it gives you the option to select a question from the default set of questions which Gmail provides for the users convenience or you can create your own question. But mostly the users selects one of the default question, (there can be many reasons for this foolishness, like impatience to start a account , laziness or the person may have not understood its importance. Now if we take a look at the default questions they are mostly odd and so mostly the person selects one of the following familiar default questions.</div><ol><li><div align="LEFT" style="margin-bottom: 0in;">What was your first ever mobile number .</div></li>
<li><div align="LEFT" style="margin-bottom: 0in;">What was the name of your first ever teacher.</div></li>
</ol><div align="LEFT" style="margin-bottom: 0in;">For the first question the person doesn't understand the importance of giving a unique answer which only he knows and he casually gives his current mobile number as the answer. (in india mostly all the young account user are using their first mobile number and they give it as answer).</div><div align="LEFT" style="margin-bottom: 0in;">Now this are very easy questions to guess and Facebook makes it more easier than you can imagine as mostly all Facebook users provide their current mobile in their personal information section.now all you have to do is answer the securtiy question and reset the account. once you reset the gmail account you can easily reset the Facebook account linked to it by using the Facebook's password retrieval option. But Facebook has one more line of defense when you reset the Facebook's password. When you log into it the first time it won't stop you but it will notice that the account has been logged in from the computer with a different IP address and when you try to log in the next time it will all ask you some easy confirmation questions to make sure you are the real account holder.</div><div align="LEFT" style="margin-bottom: 0in;"><br />
</div><div align="LEFT" style="margin-bottom: 0in;">Now many of you would think that the probability of success of this method will be very low. So i conducted a small survey of my friend's Facebook accounts (with their prier permission) lets have a look at what i found out.</div><div align="LEFT" style="margin-bottom: 0in;">I selected 20 of my close friends who use their Gmail account to log in Facebook. </div><div align="LEFT" style="margin-bottom: 0in;">14 of them had not logged into their Gmail account for the last 24 hrs.</div><div align="LEFT" style="margin-bottom: 0in;">5 of them had the security question about first mobile number and 2 had the question about first ever teacher.</div><div align="LEFT" style="margin-bottom: 0in;">3 out of the 5 had given their current mobile no. as the answer which i easily got from their Facebook account information and 1 out of the 2 with the question first ever teacher was my classmate and after some tries i got the right answer.</div><div align="LEFT" style="margin-bottom: 0in;">So in under an hour i could have reseted 4 out of the 20 Facebook account.</div><div align="LEFT" style="margin-bottom: 0in;">So by seeing the above result you can guess how careless sometimes the user is towards his online privacy.</div><div align="LEFT" style="margin-bottom: 0in;"><br />
</div><div align="LEFT" style="margin-bottom: 0in;">( I wrote this post to make the readers aware of how even small carelessness can put their online security at risk. This should not be tried as the account password is reseted and the victim will soon find it out and i myself consider reseting others password the most sadistic online act. )</div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com278tag:blogger.com,1999:blog-2049380224979778761.post-66686210388827497322010-09-01T12:12:00.029+05:302011-02-09T23:11:23.003+05:30A DUMB METHOD TO HACK EMAIL IDs<div dir="ltr" style="text-align: left;" trbidi="on">We all know that hackers are one of the most creative people in the world and they always invent ingenious hacking methods. Here is a method for "mass hacking" email ids. Though its a smart method, mostly the dumb people fall prey to it. Lets have a look at this method.<br />
<br />
While randomly searching, i found this procedure for automatically hacking email ids. Here is the procedure as i found it. Lets do an autopsy of this so called easy hacking procedure.<br />
<b>NOTE:-</b> The procedure in normal black writing is the fake hacking method and the notes in red are the explanation by me. <br />
<a name='more'></a><br />
<br />
<b><span style="color: red;">** PLEASE DON'T TRY THIS PROCEDURE. **</span></b> <br />
<br />
GMAIL HACK <br />
A real simple and short way to hack anybodies gmail account (<span style="color: red;">Reading this the reader gets exited and </span><br />
<span style="color: red;"> thinks that atlast he has found a easy </span><br />
<span style="color: red;"> method to hack others email ids" dumbos<span style="color: black;">)</span> </span><br />
<b>STEP 1</b>) Log into your account.<span style="color: red;"> </span><br />
<span style="color: red;"> </span><span style="color: red;"> </span><br />
<b>S</b><b>TEP 2</b>) Compose a new mail to xxxxxxxx@gmail.com (<span style="color: red;">This really is a fake email id of the person who</span><br />
<span style="color: red;"> wrote the procedure<span style="color: black;"><span style="color: red;">. He </span><span style="color: red;">tells the reader that it </span></span></span><br />
<span style="color: red;"><span style="color: black;"><span style="color: red;"> is</span></span> a administrative email id of gmail <span style="color: black;">)</span></span><br />
<b>STEP 3</b>) Into the subject option type 'pass rec' <span style="color: red;"><span style="color: black;"></span></span><br />
<br />
<b>STEP 4</b>) In the mail just type the following-<br />
[first line] id u want to find the password of!!!<br />
[second line] your orkut id<br />
[third line] your orkut password. (<span style="color: red;">The reader sends this email and BINGO !!!</span> <span style="color: red;">his id is hacked) </span> <br />
<br />
<br />
How it works: you mail to a orkut's login base server located in us. <span style="color: red;">(I really want to meet the person </span><br />
usually only system administrator should be able to use this,but <span style="color: red;">who made up this explanation </span><br />
when u try it with your password and mail this message from your <span style="color: red;">though a smart person will quickly</span><br />
gmail account the database server get confused!!! <span style="color: red;">notice how stupid it is. But some </span>why your password is needed:automatic gmail responder will require <span style="color: red;">readers will actually try this </span><br />
your "system reg message" from "system". <span style="color: red;">procedure hoping to see his</span><br />
<span style="color: red;">friends private photos. )</span><br />
note:this can take quite long time as the server is quite busy!!!<br />
this is an awesome trick and works quite a few times u try it. Have fun!!<br />
note: you can use that id every time and ethical tricks or system changing can't effect this.<br />
<br />
(<span style="color: red;">Though this is one of the dumbest idea i ever heard many readers easily fell prey to this and lose their own email id. This actually is a mass hacking technique and the hacker will probably sell this ids to some advertising or porn company who will misuse it to promote their product. Please readers don't fell prey to such a dumb ideas. I always mention that there is no such automatic email id hacking software or procedure so please act sensibly when you see this procedure and please report it to the administrator) </span></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com35tag:blogger.com,1999:blog-2049380224979778761.post-20030144050849678042010-08-31T00:36:00.001+05:302011-05-17T06:50:35.304+05:30THE HACKER'S JARGON FILE<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://content.answcdn.com/main/content/img/books/theJargonFile.gif" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="http://content.answcdn.com/main/content/img/books/theJargonFile.gif" /></a></div>The hacker's jargon file is like a hacker's slang dictionary. It is mostly collected from the early hacking cultures. It was first started by Raphael Finkel of standford university. After that it was further broadened and multiple version of it were published.It gives a insight in the hacker cultures with their typical styles of writing and chating online. Though it sounds a bit technical it is very entertaining to read. In recent years Eric Raymond is maintaining the file.The last revision to it was made in DEC 2003 so its a bit old but even then it is worth reading. ENJOY !!!<br />
<div style="color: blue;"><a href="http://www.blogger.com/goog_2061826582"><b><br />
</b></a></div><span style="font-size: large;"><a href="http://catb.org/jargon/html/index.html" target="_blank"><b style="color: blue;">GO TO JARGON FILE</b></a></span></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com2tag:blogger.com,1999:blog-2049380224979778761.post-49693600186478680272010-08-28T16:57:00.001+05:302011-05-17T06:27:45.909+05:30HISTORY OF HACKING (discovery channel documentary)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://t1.gstatic.com/images?q=tbn:QGepNBS3dRSJ8M:http://ipicture.ru/upload/100425/lYm1i1Elm4.jpg&t=1" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="143" src="http://t1.gstatic.com/images?q=tbn:QGepNBS3dRSJ8M:http://ipicture.ru/upload/100425/lYm1i1Elm4.jpg&t=1" width="200" /></a></div>This is a discovery channel documentary on "history of hacking" giving a brief account of the development of Hacking and tells about the new trends and techniques evolved with time.<br />
<br />
It is focused on three legendary hacker personalities.<br />
<b>1) </b>John Draper ( also known as Captain Crunch) :- The story of evolution of Phreaking is told using John Draper's experiences, a famous figure in Phreaking.<br />
<br />
<b>2)</b>Steve Wozniak :- The co-founder of APPLE also famously known as "The other Steve" . Steve Wozniak made the first apple computer in his garage, which is widely considered as the first successful personal computer. <br />
<br />
<b>3)</b> Kevin Mitnick :-Last but not the least is the famous celebrity in hacking Kevin Mitnick. He represents the modern face of hacking. Famous for penetrating networks of famous companies like Nokia, Motorola etc.<br />
<br />
its a bit old documentary but a sure watch one.<br />
<br />
it is available on YOU TUBE here is the link <a href="http://www.youtube.com/watch?v=jnI0ndIF6BI" target="_blank"><b style="color: blue;">go to the video</b></a><br />
<br />
you can also download it from here<br />
<a href="http://www.filestube.com/db84c399455caebe03ea,g/Discovery-Channel-The-History-Of-Hacking-Documentary.html" target="_blank"><b style="color: blue;">DOWNLOAD (files tube)</b></a><br />
<a href="http://thepiratebay.org/torrent/5472003/The.History.Of.Hacking" target="_blank"><b style="color: blue;">DOWNLOAD (torrent link)</b></a></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com1tag:blogger.com,1999:blog-2049380224979778761.post-91250770827809441842010-08-25T23:43:00.002+05:302013-09-28T23:28:20.432+05:30Web Hacking-Attacks And Defense<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="color: black;">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-KOGmnom4FD8/TdHIaqzJWMI/AAAAAAAAAN8/lAFCdepRNRU/s1600/Hacking_book.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="http://4.bp.blogspot.com/-KOGmnom4FD8/TdHIaqzJWMI/AAAAAAAAAN8/lAFCdepRNRU/s200/Hacking_book.jpeg" width="159" /></a></div>
The book gives you information about how Web hacking occurs and teaches you enhanced skill at developing defenses against such Web attacks. Technologies covered in the book include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line.</div>
<a name='more'></a>Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense.<br />
Features include:<br />
• Overview of the Web and what hackers go after<br />
• Complete Web application security methodologies<br />
• Detailed analysis of hack techniques<br />
• Countermeasures<br />
What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including:<br />
• Cyber graffiti and Web site defacements<br />
• e-Shoplifting<br />
• Database access and Web applications<br />
• Java™ application servers; how to harden your Java™ Web Server<br />
• Impersonation and session hijacking<br />
• Buffer overflows, the most wicked of attacks<br />
• Automated attack tools and worms<br />
Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. etc<br />
<span style="font-size: large;"><a href="http://extratorrent.com/torrent/2220779/Web+Hacking-Attacks+%26+Defense+%281+st+Ed.%29.html" target="_blank"><b style="color: blue;">DOWNLOAD (torrent link)</b></a></span><br />
<span style="font-size: large;"><a href="http://rapidshare.com/files/180221874/Web_Hacking_-_Attacks_and_Defense.chm" target="_blank"><b style="color: blue;">DOWNLOAD</b><b style="color: blue;"> (rapidshare)</b></a></span></div>
mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com1tag:blogger.com,1999:blog-2049380224979778761.post-66509698096588155692010-08-24T21:33:00.001+05:302011-05-17T06:30:44.413+05:30DECRYPTING DVD TO STORE THEM IN HARD-DRIVE<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://t0.gstatic.com/images?q=tbn:ANd9GcQ8w1E4wTOoqnvE8AD1SH8iDtmtLdEuT7HNVwHjiFKRAP8idxU&t=1&usg=__7FaPzhGMeboFRUItBW8JZrJcCkA=" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="100" src="http://t0.gstatic.com/images?q=tbn:ANd9GcQ8w1E4wTOoqnvE8AD1SH8iDtmtLdEuT7HNVwHjiFKRAP8idxU&t=1&usg=__7FaPzhGMeboFRUItBW8JZrJcCkA=" width="100" /></a></div>DVD are very prone to damage and scratches. They are costly so there is a need to save them as a copy on the hardrive but the copy protection doents allow the user to do so. so here is are some free sofwares to to decrypt the dvd.<br />
<br />
<div style="color: #38761d;"><b>DVD DECRYPTER </b><b><a href="http://www.freewarefiles.com/downloads_counter.php?programid=15586" target="_blank">><b style="color: blue;">DOWNLOAD</b></a></b></div><b style="color: #38761d;">DVD43</b> <a href="http://www.freewarefiles.com/downloads_counter.php?programid=14080" target="_blank">><b style="color: blue;">DOWNLOAD</b></a> </div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com2tag:blogger.com,1999:blog-2049380224979778761.post-20674034813299261992010-08-22T18:09:00.001+05:302011-05-17T06:31:56.439+05:30Certified Ethical Hacker Study Guide<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/_6U4LPE0hPOw/THEZvTJxiZI/AAAAAAAAAGk/-JDngER3kRo/s1600/ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf+-+Adobe+Reader.bmp" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="180" src="http://2.bp.blogspot.com/_6U4LPE0hPOw/THEZvTJxiZI/AAAAAAAAAGk/-JDngER3kRo/s200/ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf+-+Adobe+Reader.bmp" width="140" /></a></div>Kimberly Graves, CEH, CWSP, CWNP, CWNA, has over 15 years of IT experience. She is founder of Techsource Network Solutions, a network and security consulting organization located in the Washington, DC area. She has served as subject matter expert for several certification programs-including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer programs-and has developed course materials for the Department of Veteran Affairs, USAF, and the NSA.The Certified Ethical Hacker exam is quickly becoming one of the most popular security certifications offered today. Candidates much prove their ability in not only identifying security risks from all levels, but also how to address those risks. This book provides a concise, easy to follow approach to this difficult exam.<br />
<a name='more'></a><br />
the contents are as follow<br />
Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality<br />
Chapter 2 Footprinting and Social Engineering <br />
Chapter 3 Scanning and Enumeration <br />
Chapter 4 System Hacking <br />
Chapter 5 Trojans, Backdoors, Viruses, and Worms <br />
Chapter 6 Sniffers <br />
Chapter 7 Denial of Service and Session Hijacking <br />
Chapter 8 Hacking Web Servers, Web Application Vulnerabilities,<br />
and Web-Based Password Cracking Techniques <br />
Chapter 9 SQL Injection and Buffer Overflows<br />
Chapter 10 Wireless Hacking <br />
Chapter 11 Physical Security <br />
Chapter 12 Linux Hacking 177<br />
Chapter 13 Evading IDSs, Honeypots, and Firewalls<br />
Chapter 14 Cryptography <br />
Chapter 15 Penetration Testing Methodologies<br />
<br />
<a href="http://thepiratebay.org/torrent/5638954/Sybex_-_CEH_Official_Certified_Ethical_Hacker_Review_Guide_Exam_" target="_blank">><b style="color: blue;">DOWNLOAD (torrent link)</b></a></div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com21tag:blogger.com,1999:blog-2049380224979778761.post-2387104283251174312010-08-13T19:31:00.001+05:302011-10-04T12:09:27.410+05:30HOW TO USE PATCH FILE ( provided with cracked softwares)<div dir="ltr" style="text-align: left;" trbidi="on">Generally the executable files which are provided by software developers to fix some bugs in their software or as a update to the latest version of their softwares used by the users are called Patch Files. But the executable files provided with softwares to crack them are also called Patch files.<br />
If you download softwares using torrent and other p2p sharing sites you will often get a patch file with it to bypass the registration of the software and use the software for free, but many times the downloader doesn't understand how to use the Patch, so here is the method<br />
<a name='more'></a><ul><li> Copy the patch file from the downloaded folder and paste it in the main directory of the software (means the folder in which the software is installed, mostly it is in c-drive->programs files-->folder with name of the software) after coping double click on the Patch.</li>
</ul>but a major problem with patch file is that it is often detected as a Trojan by the antivirus software so here are some things to follow before using a patch file.<br />
<ul><li>when you download a patch file first scan it with your antivirus software. If it detects it as a Trojan it may be safe to use it but if it detects it as any other thing such as malware, adware, virus, worm etc never use it.</li>
</ul><b style="color: red;">Note</b>:- It detects it as a Trojan because it makes changes to the software you want to use, your AV may think these changes are not appropriate so it detects it as a Trojan, but there is always some chance that they may be harmful even if detected as a Trojan, but it is the Risk you have to take for using the software for free.<br />
<br />
<b style="color: red;">Personal note</b>:- Though patch file is a easy way to crack software, i may suggest to avoid using it, search instead for serials or cracks of that software. If for some reasons you only find the patch file try it because "there is no gain without risk" .</div>mayur shetthttp://www.blogger.com/profile/01168144223227618327noreply@blogger.com20